Description
Course info
Rating
(28)
Level
Intermediate
Updated
Oct 18, 2017
Duration
1h 31m
Description

This course models real world attacks, allowing you to have a broader and organic understanding of real-world attacks, measuring real business risks. In this course, Penetration Testing in Action, you'll learn about penetration testing in action. First, you'll begin with a reconnaissance and search for vulnerabilities on the target web site. This will set up a real-world model. Next, you'll explore how to exploit an SQL injection vulnerability, download and crack the website password hashes, upload a web shell, backdoor the login page, escalate our privileges, install a rootkit, and get persistent access to the system. Then, using the web server, you'll discover how to pivot to the internal network and compromise internal hosts. Finally, you'll learn how to create a custom payload to bypass the anti-virus and malware protection solution, install a backdoor in the windows client machine, loot the machine, and compromise the domain controller. By the end of this course, you'll learn how to target simple hacks allowing further courses in this series to delve into other vectors, advanced techniques, and more complex scenarios thus engaging you into an adventure style learning path.

About the author
About the author

Daniel Teixeira is a penetration tester, passionate about security, particularly interested in vulnerability research, and exploit development.

Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi. My name is Daniel Teixeira, and welcome to my course Penetration Testing in Action. I'm a long time penetration tester, security researcher, and trainer. I love teaching and mentoring so I'm thrilled to bring you this exciting course. This course models real attacks so we'll use the same tactics, techniques, and procedures as the adversary, allowing you to have a deeper understanding of the attacks and measure real business risks. You'll learn how to find attack vectors, install backdoors and rootkits, avoid malware detection to lateral movement, pivot through the target organization, use token impersonation, compromise a domain, implant a skeleton key, and exfiltrate data from the organization. The hands-on exercises and demos are based on real-world attacks to ensure your experience is as genuine as possible. Like the adversary, we'll start with reconnaissance, search for vulnerabilities, crack credentials, escalate privilege, create custom payloads and scripts, do post exploitation, pivot, and steal confidential data. You'll be amazed with the simplicity of most attacks. I hope you'll join me in this course, and learn how the adversary is working with the Penetration Testing in Action course.