Develop practical penetration testing skills with Kali Linux. Gain hands-on experience in ethical hacking and OSCP prep.
Writing basic scripts and tools to aid in the penetration testing process.
Analyzing, correcting, modifying, cross-compiling, and porting public exploit code.
Conducting remote, local privilege escalation, and client-side attacks.
Identifying and exploiting XSS, SQL injection, and file inclusion vulnerabilities in web applications.
Penetration Testing with Kali Linux (PWK) is an online pentesting course designed for security professionals and network administrators who want to take a serious and meaningful step into the world of professional penetration testing. This best-in class training course introduces students to the latest ethical hacking tools and techniques, including remote, virtual penetration testing labs for practicing the course materials. PWK simulates a full penetration test from start to finish by immersing the student into a target-rich and vulnerable network environment. Students who pass the exam earn the industry-leading OSCP certification. Exam Reference: OffSec Certified Professional (OSCP). Delivery Format: 5:1:6 • 5 weeks guided self-study **pre-work** • 1 week Online Live immersive **boot camp** • 6 bi-weekly Online Live
No upcoming dates. Please check back later.
This module introduces you to the course and sets expectations.
About The PWK Course.
Overall Strategies for Approaching the Course.
Obtaining Support.
About Penetration Testing.
Legal considerations.
The MegaCorpone.com and Sandbox.local Domains.
About the PWK VPN Labs.
Reporting.
About the OSCP Exam.
Booting Up Kali Linux.
The Kali Menu.
Kali Documentation.
Finding Your Way Around Kali.
Managing Kali Linux Services.
Searching, Installing, and Removing Tools.
The Bash Environment.
Piping and Redirection.
Text Searching and Manipulation.
Editing Files from the Command Line.
Comparing Files.
Managing Processes.
File and Command Monitoring.
Downloading Files.
Customizing the Bash Environment.
Netcat.
Socat.
PowerShell and Powercat.
Wireshark.
Tcpdump.
Intro to Bash Scripting.
Variables.
If, Else, Elif Statements.
Boolean Logical Operations.
Loops.
Functions.
Practical Examples.
Using OSINT to gather information, including the use of shodan and pastebin.
Taking Notes.
Website Recon.
Whois Enumeration.
Google Hacking.
Netcraft.
Recon-ng.
Open-Source Code.
Shodan.
Security Headers Scanner.
SSL Server Test.
Pastebin.
User Information Gathering.
Social Media Tools.
Stack Overflow.
Information Gathering Frameworks.
DNS Enumeration.
Port Scanning.
SMB Enumeration.
NFS Enumeration.
SMTP Enumeration.
SNMP Enumeration.
Vulnerability Scanning Overview and Considerations.
Vulnerability Scanning with Nessus.
Vulnerability Scanning with Nmap.
Burp Suite, PHP Wrappers.
Web Application Assessment Methodology.
Web Application Enumeration.
Web Application Assessment Tools.
Exploiting Admin Consoles.
Cross-Site Scripting (XSS).
Directory Traversal Vulnerabilities.
File Inclusion Vulnerabilities.
SQL Injection.
Introduction to the x86 Architecture.
Buffer Overflow Walkthrough.
Discovering the Vulnerability.
Win32 Buffer Overflow Exploitation.
About DEP, ASLR, and Canaries.
Replicating the Crash.
Controlling EIP.
Locating Space for Your Shellcode.
Checking for Bad Characters.
Finding a Return Address.
Getting a Shell.
HTA Attacks, Microsoft Word Macros, Object Linking and Embedding (DDE).
Know Your Target.
Leveraging HTML Applications.
Exploiting Microsoft Office.
A Word of Caution.
Searching for Exploits.
Putting It All Together.
Fixing Memory Corruption Exploits.
Fixing Web Exploits.
Considerations and Preparations.
Transferring Files with Windows Hosts.
What is Antivirus Software.
Methods of Detecting Malicious Code.
Bypassing Antivirus Detection.
Wrapping Up.
Information Gathering.
Windows Privilege Escalation Examples.
Linux Privilege Escalation Examples.
Enumerating Firewall and Status Rules, Bypassing UAC.
Wrapping Up.
Mimikatz.
Wordlists.
Brute Force Wordlists.
Common Network Service Attack Methods.
Leveraging Password Hashes.
Wrapping Up.
HTTP tunneling.
Port Forwarding.
SSH Tunneling.
PLINK.exe.
NETSH.
HTTPTunnel-ing Through Deep Packet Inspection.
Wrapping Up.
Advanced options with multi/handler, transport modules, Meterpreter.
Section: Metasploit User Interfaces and Setup.
Exploit Modules.
Metasploit Payloads.
Building Our Own MSF Module.
Post-Exploitation with Metasploit.
Metasploit Automation.
Wrapping Up.
Active Directory Theory.
Active Directory Enumeration.
Active Directory Authentication.
Active Directory Lateral Movement.
Active Directory Persistence.
Includes Kerberos attacks, password spraying AD.
Wrapping Up.
Introduction to PowerShell Empire and the use of Power-Up.
Installation, Setup, and Usage.
PowerShell Modules.
Switching Between Empire and Metasploit.
Wrapping Up.
Sandbox.local hands-on walkthrough.
Public Network Enumeration.
Targeting the Web Application.
Targeting the Database.
Deeper Enumeration of the Web Application Server.
Targeting the Database Again.
Targeting Poultry.
Internal Network Enumeration.
Targeting the Jenkins Server.
Targeting the Domain Controller.
Your team deserves training as unique as they are.
Let us tailor the course to your needs at no extra cost.
Trusted by Engineers at:
and more...
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier