This course models real world attacks, allowing you to have a broader and organic understanding of real-world attacks, measuring real business risks. In this course, Penetration Testing in Action, you'll learn about penetration testing in action. First, you'll begin with a reconnaissance and search for vulnerabilities on the target web site. This will set up a real-world model. Next, you'll explore how to exploit an SQL injection vulnerability, download and crack the website password hashes, upload a web shell, backdoor the login page, escalate our privileges, install a rootkit, and get persistent access to the system. Then, using the web server, you'll discover how to pivot to the internal network and compromise internal hosts. Finally, you'll learn how to create a custom payload to bypass the anti-virus and malware protection solution, install a backdoor in the windows client machine, loot the machine, and compromise the domain controller. By the end of this course, you'll learn how to target simple hacks allowing further courses in this series to delve into other vectors, advanced techniques, and more complex scenarios thus engaging you into an adventure style learning path.
Setting up Your Virtual Penetration Test Lab
Hunting Internal Targets
Owning the Domain
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.