Pentestmag

Latest Workshops

Automate your pentests with Python Training

  • Learn how do professional pentesters use Python to automate pentests and create exploits, scanners and fuzzers.
  • Work with Metasploit from your auto-pentest scripts.
  • Write your first basic application with given functionality.
  • Write a script that goes through directories and checks file permission.
  • Try to build your own simple proxy server. It should proxy all traffic by sniff trafic to predefined destinations.
  • Additional task is to implement packet injection there.
  • Write a script to check it for sql injections.
  • Implement your script which is a PoC of well-known vulnerability.

    And more…

Twice in a month the instructor provides the students with the materials regarding the topic of this particular issue. Each portion of the delivered materials is gathered in a form of an in-depth article describing and explaining the topic. Additionally the instructor is sharing other media files, like videos, if applicable.

Except of the article, each lesson includes homework to test the gained knowledge and skills of the student. Once the homework is done, the student is sharing his results with the instructor and having a live chat with him in the appointed hours.

Additionally, for the course period, the instructor is available via e-mail for students to ask questions and confront their thoughts with the instructor.

The additional option of the courses is the possibility for the students to interact with themselves, seeking some support or just discussing some course related issues.

Module 1 – Using operating system features.

Topic 1: Multithreading

Topic 2: IPC

Topic 3: Permissions 


Exercise.

a) Write a script that goes through directories and checks file permission. If permissions differ from predefined value – it changes it.


Module 2 – Using Network in Python.

Topic 1: Implementing trafic sniffer

Topic 2: Packet injectors

Topic 3: Working with tcpdump PCAP files

Topic 4: Crafting packets with Scapy


Exercise

a) Implement your own server using sockets that can accept commands and run them in OS shell (and give results back)

b) Try to build your own simple proxy server. It should proxy all traffic by sniff trafic to predefined destinations. Additional task is to implement packet injection there.


Module 3 – Python and Web application

Topic 1: How to emulate web browser with Python

Topic 2: Parsing HTML/XML/JSON

Topic 3: Web services

Topic 4: Fuzzing

Topic 5: Scripting SQL injections


Exercise.

a) Write your fuzzer to test application example given in module.

b) Write a script to check it for sql injections


Module 4 – Using Python in exploitationMetaSploit.

Topic 1: Debuggers

Topic 2: Methods of development

Topic 3: Working with binaries in Python

Topic 4: Linking together our tool and Metasploit

Topic 5: Metasploit plugins

Topic 6: RPC

Topic 7: Parsing metasploit results

Topic 8: Automation


Exercise.

a) Implement your script which is a PoC of well-known vulnerability. Links are in module

b) Write your own plugin to Metasploit. It can do whatever you want (or take the idea from the module)



Vladimir Korennoy

Head of Development of Information Security Systems at PentestIT.

Currently develops brand new SIEM system DataSafety.

DataSafety will present a new level of automating and provide easy connections with all popular security tools.

Ask for invittion to sample module [email protected]

Successful Vulnerability Assessment using Nessus: how to discover the weakness points in your system 

Through these live classes you will learn how to carry out a successful vulnerabilities assessment and discover your system weakness points before the attackers do.
When it comes to your system security you should have a hacker mind and a security professional actions. We will test our skills through virtual labs which contain different operating systems, different softwares and different configuration to make sure that we gained the skills required to carry out a professional assessment.

Twice in a month the instructor provides the students with the materials regarding the topic of this particular issue. Each portion of the delivered materials is gathered in a form of an in-depth article describing and explaining the topic. Additionally the instructor is sharing other media files, like videos, if applicable.

Except of the article, each lesson includes homework to test the gained knowledge and skills of the student. Once the homework is done, the student is sharing his results with the instructor and having a live chat with him in the appointed hours.

Additionally, for the course period, the instructor is available via e-mail for students to ask questions and confront their thoughts with the instructor.

The additional option of the courses is the possibility for the students to interact with themselves, seeking some support or just discussing some course related issues.

Pre-Course Material (Introduction)
=======
 
We will know the meaning of automatic vulnerability scanners.
We will learn how we can install Nessus for Windows and Linux operating systems.
We will know what it the meaning of Nessus plugins and how we can update the plugins online and offline.
1. Nessus Vulnearinbility Scanner
2. Installing Nessus for Windows and Linux
3. Updating Nessus Plugins online and offline
 
Exercises:
========
1. Installing Nessus for Windows
2. Installing Nessus for Linux
2. Updating Nessus Plugins online and offline
 
+ Video
 

Module.1
========

In this module we will discover the different scans policies and how we can create a police that suite our targets and choose the correct plugins to avoid false positive results and Denial of service.
We will run a scan against target machine and show how we can use the results to exploit our target and extracting scan reports.

1. Creating Scan Policy
2. Choosing Plugins for our scan
3. Analysing Scan results
4. Using the results to exploit the target
5. Extracting Nessus report
6. Import Report in metasploit for furthur usage

Exercises:

========

1. Creating different scan policies
2. Customize the scan plugings
3. Scan Windows7 and windows XP using Nessus
4. Analyse the scan results and find exploit to the findings
5. Exploit the target
6. Import the Scan into Metasploit
 

Module.2

========
 
Through this module we will discover how we can use Nessus to Audit Databases.
We will learn what is the meaning by PCI-DSS “Payment Card Industry” and how we can use Nessus make sure that we are following this standard.
1. Create policy for database auditing
2. Run scan against installed database
3. Use the scan result to find a way to login to our databse
4. Create PCI-DSS scan policy and run a scan against a real target
 
Exercises
=========
 
1. Create database auditing policy and run scan against installed database
2. Analyse the scan result and use some finding s to login to database
3. Create PCI-DSS policy and run a scan a against target machine

 
Module.3
=======
 
In this module we will face another interesting part in Nessus which is web application vulnerability assessment.
We will see how we can use Nessus to discover the flaws on our web application to secure them.
1. Host web applications on our website
2. Create web application scan Policy
3. Run scan against our web application
4. Analyse the scan results and find the flaws on our application
 
Exercises:
=========
1. Install Web application on a web server
2. Create scan policy and run scan against the previously installed web application
3. Analyse the scan result and discover the flaws

 
Module.4
========
 
In this module we will show another software for automatic vulnerability scanners (OpenVas) which can be found on Kali linux distro.
We will show how we can install this software and use it for running a scan against our target and analysing the report.
1. Configuring OpenVas on Kali linux
2. Running Scan against targets
3. Analysing the scan reports
4. Use the scan result for exploiting the machine
 
Exercises:
========
 
1. Installing OpenVas on Kali
2. Scan Some targets with  different operating System (Linux and Windows)
3. Analyse the scan result and find some exploit to these findings

 



Mohamed Magdy

Certified Information Systems Security Professional (CISSP)

EC-Council Certified Security Analyst (ECSA)

Certified Penetration Testing Engineer (CPTE)

Cisco certified network associate (CCNA)

Offensive Security Certified Professional (OSCP)

Certified Ethical Hacker V8 (C|EH V8)

Licensed Penetration Tester V8 (LPTV8)

Advanced Network Defense (EC-Council CAST 614)

Offensive Security Wireless Professional (OSWP)

GIAC Security Essentials Certified (GSEC)

Certified White Hat Hacker (CWHH)

Symantec Endpoint Protection 12.1 Technical Specialist (STS)

Red Hat Certified System Administrator (RHCSA)

Information technology infrastructure library (ITIL)

Open Source Intelligence (OSINT)

Ask for invittion to sample module [email protected]

 

Ready to join?

Take your skills to the next level!

Signup


0

Magazines

0

Online Courses

0

Number of Users

 

Popular Issues

Recent Posts

Testimonials

Partners with