Introduction to penetration testing and ethical hacking
  • Introduction
  • Web application analysis in real time
  • HTTP Protocol basics
Building your penetration testing Box (LAB)
  • Setting-up OWASPbwa VM
  • Setting-up KALI LINUX vm
  • Setting-up metasploitable
  • Setting-up Windows VM
Penetration Testing methodologies
  • Penetration Testing methodologies
Passive Discovery - Open Source Intelligence gathering
  • Open source intelligence gathering - Basics
  • Open source intelligence gathering - Recon-ng
  • Open source intelligence gathering - DiscoverScript
  • Open-source intelligence gathering - Spiderfoot
  • Recon-ng - Complete info data - Refined
Active Discovery - Reconnaissance
  • Active Reconnaissance with Sparta
  • Scanning Entire network in 6 minutes
  • Taking massive snapshot of web
Vulnerability Assessments
  • Vulnerability Assessment - Nessus
  • Vulnerability Assessment - OpenVAS
  • Vulnerability Assessment - Nikto
  • Quick findings of web apps vulnerabilities
  • Web application scanning - ZAP
  • ZAP scan analysis
  • Web application scanning - AppSpider_pro
Vulnerability to Exploitation - Exploiting the targets
  • Metasploit Commanding
  • Metasploit - Exploiting MS08-067
  • Metasploit - Exploiting web apps
  • Binary Exploitation - Buffer overflow attack
  • Browser Exploitation with BeEF
Web application Penetration testing - Exploitation
  • Exploiting SQL Injection
  • Cross Site Scripting attacks - XSS
  • Cross Site Request Forgery attack - CSRF
  • Fuzzing Input fields
  • Web app testing methodologies and bug findings
Wireless Network Hacking
  • WPA/WPA2 Cracking ( wireless security testing )
Post Exploitation attacks - Lateral Moving in Networks
  • First post Responder
  • Adding user account to target machine
  • Creating persistent backdoor on target machine
  • Msfvenom-msfpc with RC scripts
  • Dumping cached credentials ( last 10 passwords )
Antivirus / Firewalls / IDS EVASION
  • Firewall Evasion with NMAP
  • Content filter bypass with metasploit
  • Veil Evasion framework (Evading Anti-viruses)
Password Cracking and Exploits
  • Windows Password cracking - KON BOOT
  • Linux Password Hash cracking - jtr
  • Generating alpha-numeric passwords lists
  • Generating Passwords lists from target sites
EXPLOITS AND VULNERABILITY SEARCH
  • SearchSploit in kali
  • Exploits search in bugtraq
  • Exploits in EXPLOIT-DB
  • Google hacking for Exploits and passwords
ANONYMITY
  • Being anonymous & safe internet
MY PENETRATION TESTING TIPS
  • Best Commercial Tools
  • Top Security Conferences & magazine
  • Bug Bounty programmes
BONUS LECTURE
  • Penetration Tester's Suitcase - International
  • THE DARKNET - Deep web links (Dark side of the internet)
  • WannaCry Ransomware
  • Petya Ransomware