You will be performing attacks in realistic environments against a prepared Windows Environment. To your aid comes the latest hacking tools and techniques.
After this lab, you will have a greater understanding of how hackers are breaking down the system in Windows environments. The Lab follows a pedagogic process for attacking systems.
Tailored Training or a Scheduled Course?
We can help you or your team understand your specific skills and development needs. Send us a request, and we’ll guide you, or reserve a spot on our next scheduled course below.
Prerequisites
Basic knowledge of TCPI/IP and Windows Administration.
Course Objectives
You will have a good understanding of the current attack types against the Windows platform, and learn the tools and techniques hackers are using.
Material
Labs, presentations, lab files, tools, and scripts
Details
Knowledge of how systems can be penetrated is crucial for securing your IT environment. You will learn how to map internet presence and to perform network scanning, perform automated password attacks, take over systems using different vulnerabilities, use network sniffing, monitor traffic and password on switched networks, extract password hashes from systems, install backdoors, Trojans, and Rootkits, learn advanced techniques for passing through firewalls, manage keyloggers, changing log files, breaking into Active Directory, using rainbow tables, using passing-the-hash-techniques, attack web servers, terminal servers and much more.
Day 1
Overview of the process
mapping internet presence
Scanning and Enumeration of known services
Day 2
Penetration of vulnerable services using different attack techniques
Attack system for raising your own privileges
Test different methods for getting interactive access to a hacked system
Day 3
Extract useful information from a system
Cleaning log files, install backdoors, Trojans, and Rootkits