+91 9830881440

info@adroitacademy.com

cpt-logo

Network Penetration Testing

First Level- NPT- 1

The Hackers make the Corporate and other Networks their victims very systematically. Their execution is extremely flawless to steal every valuable data and erasing their tracks completely. A penetration test is a proactive and authorized attempt to evaluate the security of an IT infrastructure by safely attempting to exploit system vulnerabilities, including OS, service and application flaws, improper configurations, and even risky end-user behavior. A penetration tester is a type of network security consultant that tries to break into or find possible exploits in different computer systems and software. You can think of them as a type of ethical hacker.

Course Description

  • Types of Penetration Testing
  • Vulnerability against Penetration Testing
  • Metasploit Basics
  • Intelligence gathering (Passive and Active)
  • Port Scanning in depth
  • Server Message Block Scanning
  • FTP Scanning
  • Network Scanning
  • Basics of Exploitation
  • Exploiting Windows and Linux OS
  • Brute Forcing Ports
  • Privilege Escalation
  • Creating Stand-alone binaries with MSF payload
  • Evading Antivirus
  • Exploitation using Client side attack
  • Browser based attack
  • File format exploit
  • Social Engineering Toolkit
  • Web attack vectors
  • Client side web exploits
  • Simulated Penetration Testing
  • Exploiting webservers

Second Level- NPT- 2

On completion of NPT- 1, Penetration Testing of Cloud-based Networks and Infrastructures (IaaS) are covered in NPT- 2. The assessment of IaaS and vSphere-based systems, exploitation and post-exploitation are specifically focused in this course.

Course Description

  • Advanced Metasploit (using Scanners, Auxiliary modules, Post-exploitation)
  • Advanced Meterpreter and back-dooring
  • Advanced Malware and PHP Malware
  • VPN Penetration Testing
  • Running non-MSF exploits
  • Hacking Mail Servers
  • Reverse TCP Connections
  • Binding Trojans/ Shells to ports
  • Rooting exploits
  • SMB exploits
  • Extracting credentials from system memory
  • Userland to Root exploits
  • Windows Session hacking