Course info
Oct 18, 2017
1h 31m

This course models real world attacks, allowing you to have a broader and organic understanding of real-world attacks, measuring real business risks. In this course, Penetration Testing in Action, you'll learn about penetration testing in action. First, you'll begin with a reconnaissance and search for vulnerabilities on the target web site. This will set up a real-world model. Next, you'll explore how to exploit an SQL injection vulnerability, download and crack the website password hashes, upload a web shell, backdoor the login page, escalate our privileges, install a rootkit, and get persistent access to the system. Then, using the web server, you'll discover how to pivot to the internal network and compromise internal hosts. Finally, you'll learn how to create a custom payload to bypass the anti-virus and malware protection solution, install a backdoor in the windows client machine, loot the machine, and compromise the domain controller. By the end of this course, you'll learn how to target simple hacks allowing further courses in this series to delve into other vectors, advanced techniques, and more complex scenarios thus engaging you into an adventure style learning path.

About the author
About the author

Daniel Teixeira is a penetration tester, passionate about security, particularly interested in vulnerability research, and exploit development.

Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi. My name is Daniel Teixeira, and welcome to my course Penetration Testing in Action. I'm a long time penetration tester, security researcher, and trainer. I love teaching and mentoring so I'm thrilled to bring you this exciting course. This course models real attacks so we'll use the same tactics, techniques, and procedures as the adversary, allowing you to have a deeper understanding of the attacks and measure real business risks. You'll learn how to find attack vectors, install backdoors and rootkits, avoid malware detection to lateral movement, pivot through the target organization, use token impersonation, compromise a domain, implant a skeleton key, and exfiltrate data from the organization. The hands-on exercises and demos are based on real-world attacks to ensure your experience is as genuine as possible. Like the adversary, we'll start with reconnaissance, search for vulnerabilities, crack credentials, escalate privilege, create custom payloads and scripts, do post exploitation, pivot, and steal confidential data. You'll be amazed with the simplicity of most attacks. I hope you'll join me in this course, and learn how the adversary is working with the Penetration Testing in Action course.

Setting up Your Virtual Penetration Test Lab
In this module, I will help you set up your lab environment, which will allow you to explore complex attack scenarios. One of the most challenging tasks while performing a pen test is to chain multiple exploits and techniques in order to obtain access to information or systems. Using this approach, you are providing a more realistic scenario with meaningful results and bring more value and insight to the target organization. Data breaches. Look at the history of data breaches. We can find a pattern. We are doing it wrong. Every single year we spend more money on security and the numbers are just growing. The adversary's winning. Just this year, millions of records have been compromised, and I'm not talking about small companies that cannot afford security teams and fancy products. The problem goes deeper than that. The security teams aren't getting the adequate training and the products can be easily bypassed. Mind you, the adversary has access to the same products, and they can craft their tools to work around it. Really, the numbers are mesmerizing. As a pen tester, I can assure you that most of those credentials will remain valid for a couple of years.

Initial Compromise
Daniel Teixeira here, and welcome to module 3, the Initial Compromise. In this module, we are going to talk about our toolkit, the methodology we're using during the test, the objective of our engagement, our scope, and I'll show you some techniques that will allow us to compromise our first target and gain a foothold to the target organization. Knowing what a specific tool does and how it works is just the first part of the puzzle. Knowing when and how to use the tool in a real-world scenario is a different story since most of the times you'll be in an environment far from perfect. During your pen test, you'll have to adapt your approach and tools to the host you are testing. This is why pen testers are always learning. Every engagement is a different scenario with different targets, technologies, and vectors. Mastering the tools and techniques allows us to adapt since we know the capabilities of our toolkit. Adversary simulation is the next step. To better mimic the stealth, sophistication, and persistence of real-world adversaries, we use the same tactics, techniques, and procedures, allowing us to explore real-world risks that the organization may face. Adversary simulation establishes real-world persistence inside of the infrastructure, thus providing real-world indicators of comprise to the instant response team.