In this self-paced online training course, you will cover three main topics: Information Gathering, Backdooring and Covering Steps, how to use system specific tools to get general information, listener shells, metasploit and meterpreter scripting.
Overview
Syllabus
- Section 1
- Post Exploitation Hacking Introduction
- Basics of Networking Mac & IP Addressing
- Basics of Networking - Tcp; Udp; Icmp
- Basics of Networking - Headers
- Introduction Information Gathering
- Section 2
- Linux Host Information Gathering (part 1) Ifconfig
- Linux Host Information Gathering (part 2) netstat
- Linux Host Information Gathering (part 3) Nsswitch.conf.info
- Linux Tools Lab (part 1) Ifconfig, Arp, Netstat
- Linux Tools Lab (part 2) Resolv.conf, Nmap, Nsswitch
- Linux Scanning Lab
- Linux Network Information Gathering Lecture (part 1)
- Linux Network Information Gathering Lecture (part 2)
- Linux Sniffing
- Windows Host Tools (part 1)
- Windows Host Information Gathering Lecture
- Windows Host Tools (part 2)
- Windows Network Tools Lab
- Windows Network Information Gathering Lecture (part 1)
- Windows Network Information Gathering Lecture (part 2)
- Windows Network Information Gathering Lecture (part 3)
- Section 3
- Introduction Part 3 Persistence & Backdooring
- Tftp Use Lab
- Enabling Rdp Windows Lab
- Rdp Lecture
- Ncat Backdoor Lecture
- Windows Ncat Backdoor Lab
- New User Backdoor Lecture
- Windows New User Backdoor Lab
- Batch Schtasks At (part 1)
- Batch Schtasks At (part 2) Windows Scheduling
- Linux Bash History - Touch - Lab
- Section 4
- Linux Bash History - Covering Tracks
- Password Cracking Concepts
- Windows Logs, Timestamps, & Passwords Lecture
- Windows Clearing Event Logs
- Windows Passwords
- Conclusion
Taught by
Joe Perry