دوره (PWK (Penetration Testing with Kali Linux توسط شرکت Offensive Security ارائه می گردد. دوره PWK به افراد توانایی تست آسیب پذیری، نفوذ به شبکه را به صورت پیشرفته می دهد. جمع آوری اطلاعات به صورت دقیق، پیدا کردن اسیب پذیری، کار کردن با Exploit های مختلف، ویرایش Exploit های موجود ،کشف آسیب پذیری در برنامه های کاربردی، دور زدن فایروال و انتی ویروس از مطالب اصلی این دوره می باشد.
لینک دانلود دوره ویدئو آموزشی تست نفوذ با کالی لینوکس Penetration Testing with Kali Linux (PWK) 2020
حجم : 2.57 گيگابايت
رمز فايل: technet24.ir
PWK Active Directory Attacks
We’ll get to the point: Penetration Testing with Kali Linux (PWK) has been overhauled for 2020. It’s bigger and better than ever before. PWK is the foundational penetration testing course here at Offensive Security, and the only official training for the industry-leading OSCP exam. The original version of the course has enabled thousands of information security professionals to build their careers.
Updating PWK to integrate the latest technology, tools and processes is critical to continuing to support our students. Our teams have worked hard to not only develop new additions to the content, but also to completely revise all the modules for a better experience.
The 2020 PWK overhaul more than doubles the amount of course content and adds 33% more lab machines to provide you with even more practice and experience. PWK is still a foundational course, intended to push infosec professionals to the next level.
What’s updated for 2020
As noted above, the entire course has been updated. The most notable updates are included below.
Practical Tools: Added PowerShell and PowerCat.
Passive Information Gathering: We cover more OSINT, as well as using Shodan and Pastebin.
Privilege Escalation: We added content on local information gathering techniques, enumerating firewall rules, as well as bypassing UAC and several privilege escalation examples on Windows and Linux.
Client Side Attacks: Learn more about HTA attacks, Microsoft Word macros, object linking and DDE embedding.
Web Application Attacks: A deeper dive on traditional web attack vectors, including exploiting admin consoles, XSS, directory traversal vulnerabilities, SQL injections and more.
Password Attacks: Expanded material for online, offline and in-memory based password attacks.
Port Redirection and Tunneling: New and expanded exercises on tunneling, pivoting, and port redirection. Students will now be able to practice these techniques using their three dedicated virtual machines, before applying their new-found knowledge in the shared labs.
Metasploit: Increased coverage on the Metasploit framework. Covering auxiliary modules, exploits, payloads, scanners, meterpreter, post-exploitation, automation, and more!
Who is this course for?
This course is designed for information security professionals who want to take a serious and meaningful step into the world of professional penetration testing. This includes:
Pentesters seeking an industry-leading certification
Other technology professionals
PWK is a unique course that combines traditional course materials with hands-on simulations, using a virtual lab environment. The course covers the following topics. View the full syllabus.
Penetration Testing: What You Should Know
Getting Comfortable with Kali Linux
Command Line Fun
Passive Information Gathering
Active Information Gathering
Web Application Attacks
Introduction to Buffer Overflows
Windows Buffer Overflows
Linux Buffer Overflows
Locating Public Exploits
Port Redirection and Tunneling
Active Directory Attacks
The Metasploit Framework
Assembling the Pieces: Penetration Test Breakdown
Trying Harder: The Labs
All students are required to have:
Solid understanding of TCP/IP networking
Reasonable Windows and Linux administration experience
Familiarity of Bash scripting with basic Python or Perl a plus
What competencies will you gain?
Using information gathering techniques to identify and enumerate targets running various operating systems and services
Writing basic scripts and tools to aid in the penetration testing process
Analyzing, correcting, modifying, cross-compiling, and porting public exploit code
Conducting remote, local privilege escalation, and client-side attacks
Identifying and exploiting XSS, SQL injection, and file inclusion vulnerabilities in web applications
Leveraging tunneling techniques to pivot between networks
Creative problem solving and lateral thinking skills