
Persistent Attack and Exploitation: Offense |
|
Course Outline
|
Footprinting Public Information Search Engines Public Postings Maltego
|
Enumeration Traffic Analysis Raw Communications Host Discovery Port Scanning Service Enumeration Vulnerability Scanning
|
Attack Password Cracking Misconfigurations Exploitation Active Attacks Social Engineering
|
Escalation Maintain Access Escalate Privileges Leverage Weakness Pilfer Data
|
Day 1 - Footprinting
Day 1 introduces methods of gaining open source information on a designated target. The importance of a methodical and complete process for gathering information and keeping it organized is discussed. Day 1 also reinforces the thorough and organized manner required for successful information gathering.
MAJOR TOPIC AREAS
- Public Information
- Search Engines
- Mining Public Postings
- Maltego
- Footprinting Daily Challenge Lab
Day 2 - Enumeration
Day 2 focuses on more active and less passive methods and tools used to further investigate the target and begin to focus the attack on discovered weaknesses. Basic concepts of how communication occurs on the network will be explored enabling a better understanding of how to compromise it. Tools and techniques to discover weaknesses and exploitable targets is discussed and demonstrated.
MAJOR TOPIC AREAS
- Traffic Analysis and Sniffing
- Raw Communications and Connections
- Host Discovery
- Port Scanning
- Service Enumeration
- Vulnerability Scanning
- Enumeration Daily Challenge Lab
Day 3 - Attack
Day 3 focuses on taking advantage of the information found during Day 2 and using that to find and use exploits to penetrate target machines. A variety of exploit sources and exploit types are explored and tested and alternate methods of penetration are discussed. Social engineering will be touched on and web attack methods will be explored.
MAJOR TOPIC AREAS
- Password Cracking
- Leverage Misconfigurations
- Exploit Vulnerabilities
- Active Network Attacks
- Social Engineering
- Attack Daily Challenge Lab
Day 4 - Escalation
Day 4 focuses on strengthening our hold in the network by fundamentally understanding the basic architecture of Windows and Unix/Linux hosts and networks. We will use this understanding to our advantage to escalate privilege levels and expand our hold in the network.
MAJOR TOPIC AREAS
- Maintain Access
- Leveraging Local Vulnerabilities
- Pilfering Data
- Escalation Challenge Lab
Labs and Exercises
- Whois and ARIN
- Search engine use
- Email harvesting
- Other public information and Metadata
- Using tools like Maltego
- Major Footprinting Lab
- Traffic Analysis and Sniffing
- Raw Communications
- DNS insecurities
- Port scanners
- Vulnerability scanners
|
- Major Enumeration Lab
- Password security and attacks
- Exploiting misconfigurations
- Vulnerability exploit tools like metasploit
- Active network attacks
- Man in the middle attacks
- Major Attack Lab
- Escalation of privileges
- Compromising local executables
- Pilfering and scraping information
- Major Escalation Lab
|
|