Syllabus: Penetration Testing Course - Professional Version 4.0
Syllabus: Penetration Testing Course - Professional Version 4.0
Syllabus: Penetration Testing Course - Professional Version 4.0
PTPv4 at a glance:
Five top level authors Penetration Testing Course - Professional Version 4.0
SYLLABUS
Five knowledge domains
Module 4: Shellcoding
4. Shellcoding
4.1. Execution of a Shellcode
The art of Shellcoding is 4.2. Types of Shellcode
made available to anyone Local
through easy to understand Remote (Connect Back, Bind, Socket Reuse)
samples and real world Staged / Egg-hun / Omelet
4.3. Encoding of Shellcode
complex scenarios.
4.3.1. NULL-free Encoding
4.3.2. Alphanumeric and Printable Encoding
A small part of theoretical
4.4. Debugging a Shellcode
aspects will introduce the
4.5. Creating our first Shellcode
practical examples where 4.5.1. Finding Function Addresses
you will actually create your 4.5.2. Creating a small ASM code
own shellcode through the 4.6. A more advanced Shellcode
use of compilers and 4.6.1. String Terminator
assemblers. 4.6.2. NULL-Free Shellcode
4.6.3. Manual Editing
Different techniques are 4.6.4. Encoder tools
shown in order to let you 4.7. Shellcode and Payload Generators
4.7.1. Msfvenom
create your own shellcode.
Module 5: Cryptography and Password Cracking
Almost all penetration test 5. Cryptography & Password Cracking
engagements require the 5.1. Introduction
understanding of cryptographic topics. 5.2. Classification
5.3. Cryptographic Hash Function
This module will ensure that you are 5.4. Public Key Infrastructure
current with the most common 5.5. PGP
5.6. Secure Shell (SSH)
cryptographic technologies, algorithms
5.6.1. SSH Tunneling
and tools. 5.7. Cryptographic attacks
5.8. Security pitfalls in implementing
You will also learn how to perform
Cryptography Systems
advanced password cracking using the 5.9. Windows Passwords
best tools available. 5.9.1. LM and NT hashes
5.9.2. SAM
A thorough review of the most modern 5.9.3. Stealing hashes – Remote
tools used to steal and crack Windows 5.9.4. Stealing hashes – Local
password hashes is provided. 5.9.5. Stealing hashes – Live host
5.9.6. Stealing hashes – Offline
5.9.7. Pass the hash
5.9.8. Cracking the hash
Module 6: Malware
6. Malware
6.1. Classification
A thorough and detailed classification 6.2. Techniques used by Malware
of types of malware is the introduction 6.2.1. Streams
to a module featuring the most 6.2.2. Hooking SSDT
advanced and obscure techniques used 6.2.3. Hooking IRP
6.2.4. Hiding a process
by modern malwares.
6.2.5. API Hooking
6.2.5.1. IAT Hooking
6.2.5.2. EAT Hooking
The module is enriched as three 6.2.5.3. Inline Hooking
6.2.6. Anti-Debugging methods
malware source codes are dissected
6.2.7. Anti-Virtual machine methods
and explained: a Keylogger, a Trojan 6.2.8. Obfuscation
and a Virus. 6.2.9. Packers
6.2.10. Polymorphism
6.2.11. Metamorphism
6.2.11.1. Garbage Insertion
6.2.11.2. Registers Exchange
6.2.11.3. Permutation
6.3. How malware spreads
6.3.1. Null free shellcode
6.3.2. Alphanumeric shellcode
6.3.3. Percentage encoding
6.4. Real world Samples
6.4.1. Sample 1: Keylogger
6.4.2. Sample 2: Trojan
6.4.3. Sample 3: Virus
Network Security Section
Network security section will deal with the security testing methodology,
techniques and tools for networked PC and devices.
- Module 1: Introduction
Module 1: Introduction
1. Introduction to Web Applications
1.1. HTTP/S Protocol Basics
This module will introduce you to 1.1.1. HTTP Request
the web application security field 1.1.2. HTTP Response
and its basic terminology. 1.1.3. HTTP Header Field Definition
1.1.4. HTTPS
If you are new to this field, you will 1.2. Encoding
gather all the skills you need to 1.2.1. Introduction
move to more advanced modules. 1.2.2. Chraset
1.2.2.1. Unicode Encoding
If you are already an advanced web 1.2.2.2. HTML Encoding
1.2.2.3. URL Encoding
application security tester, you will
1.2.2.4. Base64
get introduced to the methodology 1.3. Same Origin
and tools followed throughout the 1.3.1. Origin Definition
course. 1.3.2. What does SOP protect from?
1.3.3. How SOP works
1.3.3.1. Example 1
1.3.3.2. Example 2
1.3.4. Exceptions
1.3.4.1. Windows.location
1.3.4.1.1. Example
1.3.4.1.2. Security Issues
1.3.4.2. Document.domain
1.3.4.2.1. Example
1.3.4.3. Cross Window Messaging
1.3.4.4. CORS
1.4. Cookies
1.4.1. Cookies Domain
1.4.1.1. Specified Cookie Domain
1.4.1.2. Unspecified Cookie Domain
1.4.1.3. IE Exception
1.4.2. Inspecting the Cookie Protocol
1.4.3. Cookie Installation
1.4.3.1. Correct Cookie Installation
1.4.3.2. Incorrect Cookie Installation
1.5. Sessions
1.6. Web Application Proxies
1.6.1. Burp Suite
1.6.2. OWASP ZAP
Hera Labs are included in this module
- Module 1: Prerequisites
- Module 2: Environment setup
- Module 3: Wireless Standards and Networks
- Module 4: Discover Wi-Fi Networks
- Module 5: Traffic Analysis
- Module 6: Attacking Wi-Fi Networks
- Module 7: Wi-Fi as attack vector
Module 1: Prerequisites
1. Prerequisites
1.1. Software
In the first module of the Wi-Fi section, 1.2. Hardware
we will see which are the 1.2.1. Antennas
hardware/software prerequisites of the 1.2.2. A note on signal strength
course. 1.2.3. Conclusions
Based in Pisa (Italy), Dubai (UAE) and in San Jose (USA), eLearnSecurity is a
leading provider of IT security and penetration testing courses including
certifications for IT professionals.