In this online, instructor led training course students will get a hands-on feel for penetration testing. The instructor goes through many of the tools available through demonstrations allowing you to better understand how exploits work and what exploits you and others can utilize. This course will be useful for any students who are wanting to do penetration testing in the real world.
Curriculum
1 Section
0 Lessons
2 Hours
Expand all sectionsCollapse all sections
Course Outline
01. MITRE Initial Access
What is MITRE
Drive-by compromise: What is it?
Watering hole attacks: SETookit – Clone websites
Malicious advertisements
SSLStrip
Exploit public-facing application: Use of software, data, or commands to take advantages of weaknesses
Buffer overflows: FuzzDB
Web exploits: Enumeration – Nikto, OWASP ZAP, Burp
WPSploit, FIMap, Kadabra, Liffy
SQL injection: SQLmap, SQLninja
Hardware Additions
Computer accessories, computers, or networking hardware may be introduced into a system as a vector to gain execution