Penetration Testing - Basics
This seminar gives a comprehensive introduction to penetration testing of IT systems, networks and IT infrastructures.
Future penetration testers learn the basics of information security and the methods of penetration testing using powerful tools. General principles, best practices and different attack techniques are presented. In practical exercises, the participants carry out attacks themselves and compromise vulnerable services provided by our modern training environment.
The training includes a variety of practical exercises for which our convenient mobile training environment is used. The participants learn to understand the vulnerabilities by solving tasks at different difficulty levels before discussing them in the group.
The participants are encouraged to use their own laptop with their own preferred working environment and don’t have to adapt to the training environment. The use of a suitable pentest environment, such as Kali Linux or Blackarch, is recommended but not required.
All contents can be adapted specifically to your needs!
- Basics of information security
- Protection targets, identification and authentication models
- Attacker models
- Important terms (Threat, Vulnerability, Risk, Controls, …)
- General procedure of penetration tests
- Information gathering / reconaissance
- OSI/ISO model, TCP/IP model
- Netcat, Wireshark
- Ettercap, Arp spoofing, SSL MitM
- Intercepting mobile device traffic
- Nmap, Banner grabbing
- DNS reconnaissance (forward lookup, reverse lookup)
- Network architectures, packet filters, firewalls, IDS/IPS
- Filetransfer, port redirection, stunnel
- Buffer overflows, server-side, client-side
- Exploitdb, metasploit
- Privilege escalation
- Trajan horse, antivirus bypass
- Online password attacks (SMTP, SSH, HTML)
- Side channel attacks, anti automation
- Symmetric vs. asymmetric cryptography,
- Hash algorithm, password storage
- Public Key Infrastructure (PKI)
- Audit (openssl, sslscan, o-saft)
- offline brute-force (john, ophcrack)