Penetration Testing skills make you a more marketable IT tech. This module considers you have no-prior knowledge in Penetration Testing/hacking. This module will take you from a beginner to a more advanced level with hands-on examples and by the end of this module, you'll be able to hack any system like Windows/Linux/Android and become an expert ethical hacker and keep yourself secured like Information security experts!
Penetration testing is also known as pen testing or ethical hacking. It describes the intentional launching of simulated cyberattacks that seek out exploitable vulnerabilities in computer systems, networks, websites, and applications. This module is practical but it will not ignore the theory. We will start with Kali Linux basics, then will try to make you comfortable with the Linux environment. Then we will learn how to install the needed software (VirtualBox, Kali Linux, Metasploitable2, Windows 10) as virtual machines then we will start the Penetration Testing/hacking with the complete Penetration testing process from Information gathering to exploitation, maintaining access to clearing logs and Final report generation with impact and remediation.
What you will Learn:
What is Penetration Testing
Why perform a Penetration Test?
Need to know basic terms
Difference between Vulnerability Assessments vs Penetration Test
Types of Penetration Testing
Based on knowledge of the target
Based on the position of tester
Based on where it is performed
Penetration Testing Process steps
How to create Penetration Testing Lab Setup | Lab Environment
How to Create Penetration Testing Environment - Lab Setup
How to Install VirtualBox - Lab Setup
How to Install Kali Linux - Lab Setup
How to Install Metasploitable2 - Lab Setup
How to Install Windows - Lab Setup
Basic commands - Linux for Beginners | Practical Labs
Learn basic commands - Linux for Beginners | Lab
Reconnaissance and Planning | Penetration Testing | Practical Labs
Introduction to Reconnaissance and Planning
What is Passive Reconnaissance | Lab
Whois and domain information | Lab
Email harvesting | Lab
Website source code and Website mirroring | Lab
Find Social Media accounts - Information gathering | Lab
Information gathering through Job posting and Resumes | Lab
How to identify Web Application Firewall | Lab
OSINT Framework
Scanning and Discovery | Penetration Testing | Practical Labs
What is Active Reconnaissance
TCP 3-Way Handshake and TCP Flags
Active Reconnaissance -Tools
Active Reconnaissance -LAB Scenario
NMAP LAB over the internet | Lab
NMAP LAB on Local Network | Lab
NMAP LAB -Vulnerability scanning using scripts | Lab
Ethical hacking involves a hacker agreeing with an organization or individual who authorizes the hacker to levy cyber attacks on a system.
Ethical hacking is legal because the hacker has full, expressed permission to test the vulnerabilities of a system.
Passing the Certified Information Security Manager (CISM) exam indicates that the credentialed individual is an expert in the governance of information security.
The different types of hackers include white hat hackers who are ethical hackers and are authorized to hack systems, black hat hackers who are cybercriminals.
In a covert penetration test, also known as a double-blind penetration test, few people in the company will know that a pen test is occurring.
Setting Up The Laboratory
Wi-Fi Adapter Settings
Basic Terminologies & Concepts
Wireless Packet Types
Analysing Packet Types with Wireshark
WEP vs WPA/WPA2
WPA Personal and Enterprise
Wardriving with Kismet, Mapping with Google Earth
Handshake Snooper and Captive Portal Attack with Fluxion
WEP Cracking with Client and Clientless Networks
Deauthentication Attack with Bettercap
Fragmentation Attack
Cracking WPA/WPA2 with Aircrack-ng, John The Ripper, Cowpatty, Wifite 2
Becoming an ethical hacker involves learning at least one programming language and having a working knowledge of other common languages like Python, SQL, C++
Many hackers use the Linux operating system (OS) because Linux is a free and open-source OS, meaning that anyone can modify it. It’s easy to access.
The Certified Ethical Hacker (CEH) certification exam supports and tests the knowledge of auditors, security officers, site administrators, security.
Penetration testing, or pen testing, is the process of attacking an enterprise's network to find any vulnerabilities that could be present to be patched.
Install Kali Linux - a penetration testing operating system