A GUIDE TO NETWORK PENTEST



Introduction to Penetration
Testing

  • What is Penetration Testing
  • Basics of Penetration Testing
  • Types of Penetration Testing
  • Steps of Penetration Testing
  • Goals to Achieve the Penetration Testing
  • Methodologies of Penetration Testing

Working on Network Technologies (Using Packet Tracer)

  • Introduction to Networks (basics)
  • Difference between OSI and TCP model
  • IP addressing in depth
  • 1.3.1 Demo of Three Way Handshaking
  • 1.3.2 What is an IP?
  • 1.3.3 Types of Address
  • 1.3.4 Public IP address
  • 1.3.5 Private IP address
  • 1.3.6 Demos of Public and Private IP address
  • 1.3.7 Calculation of subnets/Subnet Mask
  • 1.4 Usage of Switches/ Routers/Hubs in practical scenarios
  • 1.5 Building up of Network Topologies
  • 1.6 Collisions and Broadcast Domains

3.Routers in Depth (Demos in Packet Tracer)

  • 1.What are Routers??
  • 2.Routing in details
  • 3.Tools for networking
  • 4.Static and Dynamic Routing
  • 5.OSPF (open shortest path first)
  • 6.RIP (Routing Information Protocol)
  • 7.EIGRP (Enhanced Interior gateway Routing Protocol)

4.Switches in depth (Demos in packet tracer)

  • 1. Working of a Switch
  • 2. LAN Switching
  • 3. CSMA/CD
  • 4. VLANs (in depth)
  • 1. Introduction to VLAN’s
  • 2. Access Ports and Trunk Ports
  • 3. Configuring VLAN’s in Packet Tracer
  • 4. Native VLANs
  • 5. Inter-VLAN Routing

  • 5.Switch Security
  • 6.Port Security
  • 7.VTP(Virtual LAN Trunk Protocol)
  • 1.Working of VTP
  • 2.VTP modes
  • 3.Configuring of VTP
  • 8.STP (Spanning Tree Protocol)
  • 1.Working of STP
  • 2.Configuring of STP

  • 9.NAT (Network Address Translations)
  • 1.What is NAT?
  • 2.Real-time Scenarios of using NAT
  • 3.Types of NAT
  • 4.Configuring of Static NAT
  • 10.DHCP (Dynamic Host Configuration Protocol)
  • 1.Introduction to DHCP
  • 2. Configuring of DHCP

5.Ports

  • 1. Introduction to Ports
  • 2. Working of Ports
  • 3. Types of Interfaces and ports
  • 4. Scanning of Ports (using Nmap and Nessus)
  • 5. Demo of Services running on ports

6.OS Hardening for Penetration Testing

  • 1. Introduction to LINUX
  • 2. Basic commands usage in LINUX
  • 3. Programming Basics in LINUX
  • 4. Cracking of roots in LINUX
  • 5. Difference between LINUX and windows

7.ARP (Address Resolution Protocol)

  • 1. Introduction to ARP
  • 2. Working of ARP
  • 3. Traffic Analysis (Using Wireshark)
  • 4. Introduction to Sniffing
  • 5. Demonstration

8.DOS AND DDOS

  • 1. Introduction to Denial of Service
  • 2. Introduction to Distributed Denial of Service
  • 3. Difference between both of them

  • 4. Practical Demonstration of DOS
  • 5. Practical Demonstration of DDOS
  • 6. IPSEC Policy

  • 1. Introduction to IPSEC
  • 2. Depth Study of IPSEC
  • 3. Creation of Policy to protect against DOS attacks

9.Cryptography

  • 1. Introduction to Cryptography
  • 2. Symmetric Key Cryptography
  • 3. Public Key Cryptography
  • 4. Methodologies of Cryptography
  • 1. Mono-alphabetic
  • 2. Ceaser-Cipher
  • 3. Advanced Ceaser Cipher
  • 4. Poly-alphabetic
  • 5. Vignere
  • 6. Auto-key
  • 7. Morse Code
  • 8. Transposition Cipher
  • 9. Rail-Fence Cipher
  • 10.Route-Cipher
  • 11.Cryptanalysis of Ciphers (Using Frequency Analysis)

  • 5. Fiestal Ciphers
  • 6. DES (Data Encryption Standards)
  • 5.1 Introduction to DES
  • 5.2 Working of DES
  • 5.3 Round Structure of DES
  • 5.4 Key Management Structure
  • 5.5 Demonstration of DES
  • 5.6 Double DES
  • 5.7 Meet In the Middle Attack

  • 7. AES (Advanced Encryption Standards)
  • 7.1Introduction to AES
  • 7.2 Working of AES
  • 7.3 Round Structure of AES
  • 7.4 Key Management Structure
  • 7.5 Demonstration of AES
  • 7.6 Vulnerabilities of DES and AES
  • 7.7 Exploiting the vulnerabilities to AES and DES
  • 7.8 Hash Functions
  • 7.8.1 Introduction to Hash Functions
  • 7.8.2 SHA (Secured Hash Algorithms)
  • 7.8.3 MD5 (Message Detection Algorithms)
  • 7.9 Attacks on Hash Functions

8 Intrusion Detection System

  • 8.2 Introduction to Intrusion Detection System
  • 8.3 Types of Intrusion detection System
  • 8.4 Working of Intrusion Detection System
  • 8.5 Practical Demonstration of Intrusion Detection System
  • 8.6 Generating Alerts even on PING attacks
  • 8.7 Track Down of Attacker

9 Advance Intrusion Detection System

  • 9.2 Introduction to AIDE
  • 9.3 Working of AIDE
  • 9.4 PGP and GPG Encryptions
  • 9.5 Demonstration of AIDE
  • 9.6 Detection of Added Trojans or viruses by attackers
  • 9.7 Audition of Any file

10 Wireless Penetration Testing

  • 10.2 Introduction to Wireless
  • 10.3 Types of Wireless Networks
  • 10.4 Working of Wireless Networks
  • 10.5 Working of Frequencies
  • 10.6 Multiplexing
  • 10.7 Divisions of Multiple Access
  • 10.8 FDMA
  • 10.9 CDMA
  • 10.10 TDMA
  • 10.11 In depth Study of WEP/WPA/WPA2
  • 10.12 Handshaking of Open Authentication
  • 10.13 3-way Handshaking of WEP
  • 10.14 4-way Handshaking of WPA/WPA2
  • 10.15 Vulnerabilities of WEP/WPA/WPA2
  • 10.16 Exploitation of WEP/WPA/WPA2

Who should
attend

  • All students who use computers and Internet for their personal or academic work.
  • College students for Industrial training.
  • Students from any stream can attend this training.
  • Students who want to make their career in Information Security and Ethical Hacking.
  • Staff and Employees of colleges/school can join this training to live more secure from various attacks.

Pre-
requisites

  • Only Basics of Internet.
  • What you need to bring

Things required for Online Training

  • Laptop or Desktop (Os: Win7 / Win8 / Mac)
  • Internet Connection (Speed: min. 2mbps)
  • Headphones with mic

Things required for Online Training

  • Laptop or Desktop (Os: Win7 / Win8 / Mac)
  • Internet Connection (Speed: min. 2mbps)
  • Headphones with mic

Key
Take Away

  • The premier Certification in Ethical Hacking & Information Security
  • Hacking and Security Tools, Books, Tutorials to each student
  • Training by White Hat Hackers, Ethical Hackers, and Information Security Experts
  • Covers both sides of the coin - Attacks and Counter measures
  • Live training on pre attacks with their Counter measures, Hands on use many technical tools