Offensive Security Advanced

This Course is for the beginners, who have fundamental knowledge of Information Technology. Its is the Offensive Security Basic Course.

Trainer

Harun Or Rashid

Course Fee

35000 TAKA

Duration

60 Hours

Class Duration

2:30 Hour

Number Of Class

24 Classes

Number Of Seats

10-15

Prerequisite: Knowledge: Operating System, Networking and Programming.
In the case of physical courses, Attendees have to bring their laptops.

NB: In the case of online courses, we will arrange one discussion session every week in which attendees have to come physically.

Privilege Escalation

Privilege Escalation

Discussion Topics: Information Gathering, Windows Privilege Escalation Examples, Linux Privilege Escalation Examples.

Password Attacks

Password Attacks

Discussion Topics: Wordlists, Brute Force Wordlists, Common Network Service Attack Methods, Leveraging Password Hashes.

Port Redirection and Tunnelling

Port Redirection and Tunnelling

Discussion Topics: Port Forwarding, SSH Tunnelling, PLINK.exe, NETSH, HTTP Tunneling Through Deep Packet Inspection.

Active Directory Attacks

Active Directory Attacks

Discussion Topics: Active Directory Theory, Active Directory Enumeration, Active Directory Authentication, Active Directory Lateral Movement, Active Directory Persistence.

The Metasploit Framework

The Metasploit Framework

Discussion Topics: Metasploit User Interfaces and Setup, Exploit Modules, Metasploit Payloads, Building Our Own MSF Module, Post-Exploitation with Metasploit, Metasploit Automation.

PowerShell Empire

PowerShell Empire

Discussion Topics: Installation, Setup, and Usage, PowerShell Modules.

Assembling the Pieces: Penetration Test Breakdown

Assembling the Pieces: Penetration Test Breakdown

Discussion Topics: Public Network Enumeration, Targeting the Web Application, Targeting the Database, Deeper Enumeration of the Web Application Server, Targeting the Database Again, Targeting Poultry, Internal Network Enumeration, Targeting the Jenkins Server, Targeting the Domain Controller.

Trying Harder: The Labs

Trying Harder: The Labs

Discussion Topics: Real Life Simulations, Machine Dependencies, Cloned Lab Machines, Unlocking Networks, Routing, Machine Ordering & Attack Vectors, Firewall / Routers / NAT, Passwords.