In this online, instructor led training course students will get a hands-on feel for penetration testing. The instructor goes through many of the tools available through demonstrations allowing you to scan multiple port numbers and protocols. This course will be useful for any students who are wanting to do penetration testing in the real world.
Overview
COURSE INSTRUCTOR
COURSE DIFFICULTY
COURSE DURATION
3h
Skills Learned
After completing this online training course, students will be able to:
Introduction to TCP and UDP scanning
FTP scanning of Linux OS
SSH scanning of Linux OS
Real world application of penetration testing tools
Scan protocols such as LDAP, SMB, and SNMP
Network Admins, Security team members, risk managers, and IT directors
None, but we recommend that students have a working knowledge of logical and physical network architectures, networking components, and TCP/IP.
01. Discovering hosts via Ping Scan
- nmap -sn 10.0.0.0/8
- What difference TTL means
02. TCP Scanning:
- nmap -v -p- -sT
- unicornscan -i -I -mT $IP:a
03. UDP Scanning:
- nmap -v -p- -sU
- unicornscan -i -I -mU $IP:a
04. Searchsploit (Searches exploitdb)
05. Some common ports and what to do:
- 21 – FTP
- Fingerprint version
- Check for Anonymous access
- Brute Forcing
- MITM (Requires more setup)
06. SSH
- Fingerprint version
- Brute Force
07. Telnet
- Fingerprint version
- Brute Force
08. SMTP
- Fingerprint version
- Enumerate Users
09. DNS
- Fingerprint version
- Zone transfer
- DNSRecon
- DNSEnum
10. FINGER
- User enumeration
- Potential command execution
11. WEB
- Fingerprint version
- robots.txt
- Nikto
- Dirbuster \ Gobuster
- Local \ Remote File Inclusion (LFI & RFI)
12. SNMP
- Default Community Strings
- MIBS
- .1.3.6.1.2.1.1.5 Hostnames
- .1.3.6.1.4.1.77.1.4.2 Domain Name
- .1.3.6.1.4.1.77.1.2.25 Usernames
- .1.3.6.1.4.1.77.1.2.3.1.1 Running Services
- .1.3.6.1.4.1.77.1.2.27 Share Information
- snmpwalk
- SNMP Bruteforce
13. LDAP
- Enumeration
14. SMB
- enum4linux
- smbclient
- Mounting Shares
SKILLS LEARNED
Skills Learned
After completing this online training course, students will be able to:
Introduction to TCP and UDP scanning
FTP scanning of Linux OS
SSH scanning of Linux OS
Real world application of penetration testing tools
Scan protocols such as LDAP, SMB, and SNMP
WHO SHOULD ATTEND
Network Admins, Security team members, risk managers, and IT directors
PREREQUISITES
None, but we recommend that students have a working knowledge of logical and physical network architectures, networking components, and TCP/IP.
COURSE OUTLINE
01. Discovering hosts via Ping Scan
- nmap -sn 10.0.0.0/8
- What difference TTL means
02. TCP Scanning:
- nmap -v -p- -sT
- unicornscan -i -I -mT $IP:a
03. UDP Scanning:
- nmap -v -p- -sU
- unicornscan -i -I -mU $IP:a
04. Searchsploit (Searches exploitdb)
05. Some common ports and what to do:
- 21 – FTP
- Fingerprint version
- Check for Anonymous access
- Brute Forcing
- MITM (Requires more setup)
06. SSH
- Fingerprint version
- Brute Force
07. Telnet
- Fingerprint version
- Brute Force
08. SMTP
- Fingerprint version
- Enumerate Users
09. DNS
- Fingerprint version
- Zone transfer
- DNSRecon
- DNSEnum
10. FINGER
- User enumeration
- Potential command execution
11. WEB
- Fingerprint version
- robots.txt
- Nikto
- Dirbuster \ Gobuster
- Local \ Remote File Inclusion (LFI & RFI)
12. SNMP
- Default Community Strings
- MIBS
- .1.3.6.1.2.1.1.5 Hostnames
- .1.3.6.1.4.1.77.1.4.2 Domain Name
- .1.3.6.1.4.1.77.1.2.25 Usernames
- .1.3.6.1.4.1.77.1.2.3.1.1 Running Services
- .1.3.6.1.4.1.77.1.2.27 Share Information
- snmpwalk
- SNMP Bruteforce
13. LDAP
- Enumeration
14. SMB
- enum4linux
- smbclient
- Mounting Shares