Penetration Testing: What You Should Know
About Kali Linux
About Penetration Testing
Legal
The megacorpone.com Domain
Offensive Security Labs
Getting Comfortable with Kali Linux
Finding Your Way Around Kali
Managing Kali Linux Services
The Bash Environment
Intro to Bash Scripting
The EssentiaTools
Netcat
Ncat
Wireshark
Tcpdump
Passive Information Gathering
Open Web Information Gathering
Email Harvesting
Additional Resources
ReconLng
Active Information Gathering
DNS Enumeration
Port Scanning
SMB Enumeration
SMTP Enumeration
SNMP Enumeration
Vulnerability Scanning
Vulnerability Scanning with Nmap
The OpenVAS Vulnerability Scanner
Buffer Overflows
Fuzzing
Win32 Buffer Overflow Exploitation
Replicating the Crash
Controlling EIP
Locating Space for Your Shellcode
Checking for Bad Characters
Redirecting the Execution Flow
Generating Shellcode with Metasploit
Getting a Shell
Improving the Exploit
Linux Buffer Overflow Exploitation
Setting Up the Environment
Crashing Crossfire
Controlling EIP
Finding Space for Our Shellcode
Improving Exploit Reliability
Discovering Bad Characters
Finding a Return Address
Getting a Shell
Working with Exploits
Searching for Exploits
Customizing and Fixing Exploits
File Transfers
A Word About Anti Virus Software
File Transfer Methods
Privilege Escalation
Privilege Escalation Exploits
Configuration Issues
Client Side Attacks
Know Your Target
MS12L037Internet Explorer 8 Fixed CoSpan ID
Java Signed Applet Attack
Web Application Attacks
Essential firefox AddLons
Cross Site Scripting (XSS)
File Inclusion Vulnerabilities
MySQL SQL Injection
Web Application Proxies
Automated SQL Injection Tools
Password Attacks
Preparing for Brute Force
Online Password Attacks
Password Hash Attacks
Port Redirection and Tunneling
Port Forwarding/Redirection
SSH Tunneling
Proxy chains
HTTP Tunneling
Traffic Encapsulation
The Metasploit Framework
Metasploit User Interfaces
Setting up Metasploit Framework on Kali
Exploring the Metasploit Framework
Auxiliary Modules
Exploit Modules
Metasploit Payloads
Building Your Own MSF Module
Post Exploitation with Metasploit
Bypassing Antivirus Software
Encoding Payloads with Metasploit
Crypting Known Malware with Software Protectors
Using Custom/Uncommon Tools and Payloads
Exercise
Assembling the Pieces: Penetration Test Breakdown
Phase 0 – Scenario Description
Phase 1 – Information Gathering
Phase 2 – Vulnerability Identification and Prioritization
Phase 3 – Research and Development
Phase 4 – Exploitation
Phase 5 – PostLExploitation