Advanced Ethical Hacking Training

Advanced Ethical Hacking Training

Print Friendly, PDF & Email

Introduction:

Advanced Ethical Hacking Training Course with Hands-on Labs (Online, Onsite and Classroom Live!)

This Advanced Ethical Hacking Training course aims to train you on how to successfully attack fully patched and hardened systems, how to circumvent common security controls, and how to get to confidential data. This is all possible if you have 0day exploits, or the ability to create your own exploit code. In this Advanced Ethical Hacking Training class, you will learn how to exploit modern operating system protections, such as ASLR and DEP, using ROP attacks, egghunter shellcode and heap spraying.

Modern networks and systems are fully patched, hardened from attack, and armored to the hilt with expensive security gear — but the bad guys still get in on a daily basis! How do they do this? Why is there a news release every day of another Fortune 500 company hacked, more government secrets lost to the adversary?

Your Registration Includes

  • 5 days of Advanced Ethical Hacking Training with an expert instructor
  • Advanced Ethical Hacking Electronic Guide
  • 100% Satisfaction Guarantee
  • Certificate of Completion

Resources:

Related Courses

Customize It:

  • If you are familiar with some aspects of Advanced Ethical Hacking Training, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Advanced Ethical Hacking Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Advanced Ethical Hacking course in manner understandable to lay audiences

Audience/Target Group:

  • Penetration testers
  • Security analysts
  • Cybersecurity consultants
  • Anyone with a desire to learn advanced ethical hacking skills!

Prerequisites:

  • Firm understanding of the Windows Operating System
  • Exposure to the Linux Operating System or other Unix-based operating systems
  • Grasp of the TCP/IP protocols
  • Exposure to network reconnaissance and associated tools (nmap, nessus, netcat)
  • Programming knowledge is NOT required

Objectives:

After completing this Advanced Ethical Hacking course, attendees will be able to:

  • Create 0day (private unreleased exploits) attacks as part of the “Advanced Persistent Threat”
  • Run sophisticated attacks against client side applications
  • Use fuzzers and dynamic analysis to discover vulnerabilities
  • Reverse engineer binaries to find new vulnerabilities never discovered before
  • Exploit secured web applications
  • Run chained exploits to pivot from multiple exploitable systems
  • Attack and defeat VPNs, IDS/IPS and other security technologies

Advanced Ethical Hacking Training – Course Outline:

Introduction to Advanced Hacking 

  • Overview of current security

Advanced recon 

  • Stealth strategies
  • Evading IDS/IPS
  • Passive network recon
  • Idle scanning
  • Automated metadata gathering

Blinding IDSs

  • Intrusion detection overview
  • Intrusion prevention
  • Blinding IDSs
  • Hiding from IDSs

Vulnerability mapping

  • Using nessus
  • Manual vulnerability discovery
  • Mapping client-side vulnerabilities

x86 assembly for exploit development 

  • Computing fundamentals
  • CPU registers
  • Memory segments
  • Assembly instructions

Finding vulnerabilities with debuggers

  • Debuggers
  • Hardware vs software breakpoints
  • Keygens
  • Attacking keygen algorithms
  • Protections against these attacks

Reversing win32 applications with IDA

  • Windows apps
  • Breakpointing on APIs
  • Breakpointing on messages
  • IDA
  • IDA FLIRT
  • Other IDA features

Fuzzing/fault injection

  • Manual fault injecting
  • Advances in fault injection
  • Attacking complicated protocols

Memory architecture and stack-based overflows

  • Memory segments
  • Introduction to stack
  • Functions and stack
  • Programming

SEH exploits

  • Introduction
  • Structured exception handling
  • Controlling SEH chains
  • SEH exploit mitigation techniques
  • SEHOP

Return oriented programming

  • Operating system protections
  • What is ROP?
  • Why do we need it?
  • How do we go about it?

Writing shellcode

  • Introduction
  • Null Bytes

Egghunters

  • What are egghunters
  • Why do we need them
  • Notable egghunter code
  • How do we go about it
  • Bonus content

Restricted character set exploitation

  • What is restricted character set exploitation
  • Bad characters
  • Unicode filtering
  • Alphanumeric shellcode

Attacking format strings 

  • Introduction to format strings
  • Using format functions
  • Format string vulnerability
  • Reading the stack
  • Reading arbitrary memory addresses

Payloads

  • Payload use
  • Bind shell
  • Reverse connect
  • SysCall proxy
  • DLL injection
  • Advanced exploitation

Metasploit payloads

  • Metasploit meterpreter
  • Meterpreter scripts
  • Windows adduser payload
  • Writing metasploit module

Advanced metasploit 

  • Metasploit framework
  • Labs for programming

More advanced metasploit 

  • Metasploit framework
  • Auxiliary modules
  • Post exploitation

Compressors and encryptors

  • Background on packers
  • Why use a packer
  • How a packer works
  • Strategies for defeating packers
  • Removing the packer with SofIce and ProcDump
  • The JMP EIP trick
  • Deleting the encryptor code segment

Advanced client side exploits

  • Client side vs server side
  • Why client side is popular
  • The advanced persistent threat
  • Anatomy of a client side attack
  • Types of defenses

Attacking network-based protocols

  • Attacking ARP
  • Attacking SSL
  • Traffic manipulation

Exploiting web apps

  • Web app scanning
  • Tools for tracking vulnerabilities
  • Manual investigation

Web application hacking

  • OWASP top 10
  • Eshoplifting
  • Deconstructing Java
  • Manipulating GETs
  • Manipulating POSTs
  • Attacking Cookies

SQL injection in MS SQL

  • SQL command structure
  • Discovering vulnerable apps
  • Circumventing authentication
  • Attacking availability
  • Inserting data
  • Retrieving data
  • Deleting data
  • Local system access

SQL injection in MySQL

  • Introduction
  • SQL injection in string fields
  • Circumventing strings
  • Attacking the application

CD & DVD-ROM protections

  • Common CD check routines
  • Cracking CD checks
  • A commercial protection scheme- SafeDisc
  • Cracking SafeDisc

Advanced Ethical Hacking Training

Whether you are looking for general information or have a specific question about Advanced Ethical Hacking Training, we want to help!

Request More Information

    Time frame:

    0