Cyber Security 2 – Offensive


Tools and Features:

Features of Kali Linux

Kali Linux setup

Kali Menu

Kali commands

Kali Linux services

SSH and HTTP Services

Example with Kali

Hacking Tools in Kali

Using Ncat and Netcat

Wireshark

Burp and Fiddler

Ping and nslookup

Analysis& Information Gathering

Information Gathering Survey with Kali

Knowledge gathering

Threat modeling

3DNS enumeration

Lookups (forward and reverse)

DNS zone transfer

Example with Kali

SMB enumeration

TCP and UDP Port scanning using nmap

OS finger printing and banner grabbing

Nmap scripting engine

SMTP Enumeration

Windows SNMP enumeration

Recon-ng

Netcraft

Vulnerability Scanning, Identification and Prioritization

Vulnerability scanning using Nmap

Vulnerability scanning using Nexpose

Vulnerability scanning using snort

Attacks

Buffer Overflows

Brute Force buffer overflow with example

Windows buffer overflow with example

Linux buffer overflow with example

Stack overflow

Privilege Escalation

Local privilege escalation for Windows

Local privilege escalation for Linux

Web Application Attacks using Webgoat

Injection and Input Validation and OWASP Top 10

Remote and Local File Inclusion

Web Application Proxies and WAFs

The Metasploit Framework

Setting up and Exploring Metasploit framework

Auxiliary Modules

Exploit Modules

Meterpreter, Executable payloads

Going for the kill and Game over