Loading…
Attending this event?
View analytic
Tuesday, May 14 • 8:00am - 4:30pm
Penetration Testing Fundamentals [Day 1 of 2]

Sign up or log in to save this to your schedule and see who's attending!

Course Description
This hands-on course covers the fundamentals of penetration testing using the most well known penetration testing suite, Kali Linux. On the first day, you will be hired to conduct a network penetration test. You won’t have to do it alone though; with guidance and help from an expert along the way, you will learn to execute the entire penetration testing process from reconnaissance to post-exploitation. In order to do this, you will identify vulnerabilities; exploit them to gain access; gather hashes and crack passwords; and learn privilege escalation concepts for both Windows and Linux!

If you have been thinking about the OSCP or just want to learn how to use one of the most widely used exploit tools to test system vulnerabilities, this class is for you!

Trainer Biography
Geoffrey Janjua: The founder of Exumbra Operations Group, a former US DoD civilian with 15+ years of practical, operational field experience conducting offensive operations. Specializing in computer exploitation, technical operations, and covert-entry, he is currently conducting full-scope penetration testing, vulnerability research, and exploit development of high-value products for a Fortune 500 company. He has identified multiple zero-day vulnerabilities (CVEs), presented “Kerberos Party Tricks: Weaponizing Kerberos’ Protocol Flaws” at LayerOne 2016, and holds many security industry certifications.

Attendee Pre-requirements
In order to be successful, students should have knowledge of:
  • Basic TCP/IP networking and addressing
  • How to navigate and use basic commands on the Linux and Windows command-line
  • How to boot their laptop from an external USB drive
  • Basic security concepts Attendees Should Bring an 64bit Laptop
  • Where they have administrator access EXUMBRA OPERATIONS GROUP
  • With a working ethernet port supported by Kali Linux
  • That is capable of booting from an external USB drive
  • Minimum of 4GB of RAM 
At the end of the course you will know how to:
  • Find and use network attack tools in Kali Linux
  • Conduct network based reconnaissance
  • Understand the output from reconnaissance tools
  • Identify some patch, command injection, and misconfiguration based vulnerabilities
  • Find and use an appropriate existing exploit for a given vulnerability
  • Modify and weaponize existing exploits 

Speakers

Tuesday May 14, 2019 8:00am - 4:30pm