![]() ![]() Perform Kerberos attacks including Kerberoasting, Golden Ticket, and Silver Ticket attacks.Configure the Metasploit exploitation tool to scan, exploit, and then pivot through a target environment in-depth.Utilize the Windows and Linux command lines to plunder target systems for vital information that can further overall penetration test progress, establish pivots for deeper compromise, and help determine business risks.Analyze the output of scanning tools to manually verify findings and perform false positive reduction using Netcat and the Scapy packet crafting tools.Choose and properly execute Nmap Scripting Engine scripts to extract detailed information from target systems.Utilize the Nmap scanning tool to conduct comprehensive network sweeps, port scans, Operating System fingerprinting, and version scanning to develop a map of target environments.Conduct detailed reconnaissance using document metadata, search engines, and other publicly available information sources to build a technical and organizational understanding of the target environment.Develop tailored scoping and rules of engagement for penetration testing projects to ensure the work is focused, well defined, and conducted in a safe manner.You will conduct an end-to-end penetration test, applying knowledge, tools, and principles from throughout the course as you discover and exploit vulnerabilities in a realistic sample target organization. After building your skills in comprehensive and challenging labs, the course culminates with a final real-world penetration test scenario. ![]() SEC560 is designed to get you ready to conduct a full-scale, high-value penetration test, and at the end of the course you will do just that.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |