كورس Advanced Network Penetration Testing
1.DHCP Attacks and Mitigation 1.1 DHCP Function 1.2 DHCP Starvation Attack and mitigation techniques 1.3 Rogue DHCP Server Attack and mitigation techniques 2. VLAN Attacks and Mitigation 2.1 VLAN Hopping Attack 2.2 DTP attack and mitigation 3. MAC/IP Attacks and Mitigation 3.1 CAM Overflow Attack and Mitigation 3.2 MAC Spoofing and Mitigation 3.3 IP Spoofing Attack and Mitigation 4. ARP Attacks and Mitigation 4.1 ARP Function Overview 4.2 ARP Poisoning Attack and Mitigation 4.3 Different Sniffing Tools 5. DNS Poisoning Attack and Mitigation 6. AD Attacks. 7. PowerShell Basics 8. PowerView 9. ADModule 10. Bypassing AMSI 11. General Attacks 11.1 Spanning Tree Basics 11.2 STP root attack and mitigation 11.3 Management traffic sniffing and mitigation 11.4 sniffing encrypted https traffic 12. Bypassing Antivirus 13. Credentials extraction 14. Stealing Passwords 15. Mapping 15.1 BloodHound 16. PsExec 17. Impacket 18. Responder 19. What is Kerberos, LM, NThash, NTLM, NTLMv2 20. Wireless Attacks 20.1 Wireless LAN Overview 20.2 Stations and Access Points. 20.3 Channels. 20.4 WEP|WPA protocols 20.5 Infrastructure and Ad Hoc Modes. 20.6 Passive Scanning. 20.7 Detection of APs, SSID. 20.8 Collecting the MAC Addresses. 20.9 Wireless Spoofing. 20.10 MAC Address Spoofing. 20.11 Wireless Network Probing. 20.12 AP Weaknesses 20.13 Configuration. 20.14 Defeating MAC Filtering. 20.15 Rogue AP 20.16 Trojan AP (Evil Twin Attack). 21. Active Directory Enumeration 21.1 Enumerating Users 21.2 Enumerating Computers 21.3 Enumerating Groups 21.4 Enumerating ACLs 21.5 Enumerating Group Polices 21.6 Enumerating Trusts 21.7 Enumerating Domains 21.8 Enumerating Forests 21.9 Enumerating for interesting users. 22. Local Privilege Escalation 22.1 Methods of Local Privilege Escalation 22.2 Unquoted Service Path 23. Pivoting 23.1 Port Forwarding 23.2 Proxy Chains 24. Persistence 24.1 AdminSDHolder 25. Active Directory Attacks 25.1 Pass the Hash 25.2 Pass the Ticket 25.3 Overpass-the-Hash 25.4 password Extraction using multiple methods 25.5 AS-REP Roasting 25.6 Password Spraying 25.7 Silver Tickets 25.8 Kerberoasting 25.9 Golden Tickets 25.10 DCSync Attack 25.11 DCShadow Attack 26. Using Linux to Attack Windows / Domain Environment 27. Abusing Trusts 28. Practice

غير الدولة
.jpg)
.jpg)
.jpg)
.jpg)
.jpg)
.jpg)
.jpg)
.jpg)
.jpg)

