Anda di halaman 1dari 7

HadSec Network pentesting

Professional

Kali Linux / BackBox


MUHAMMAD PAILUS

HADSEC | Jl. Proklamasi, pondonk CC, Depok Sleman, Yogyakarta


Hadsec Professional Network Pentester
Pentest merupakan salah satu profesi yang tergolong masih sedikit terutama
di negara indonesia. Dalam rangka meningkatkan mutu security sebuah perusahaan,
keahlian Pentester akan sangat menentukan bagaimana keamanan dari sebuah
perusahaan. HadSec salah satu perusahaan yang bergerak dibidang IT ikut
memberikan materi Network Pentester guna meningkatkan kemampuan Pentester
maupun bagi yang ingin belajar jadi Pentester, untuk melakukan audit kemanan
jaringan.
Semua materi yang ada dalam HadSec Professional Network Pentest telah di
persiapkan dengan segala bentuk kasus yang di sesuaikan dengan standar yang
sesuai dengan kasus yang ada di lapangan saat ini. Semua materi dalam training ini
tidak hanya di referensikan dengan standar international yang ada, tetapi juga di
tambahkan pengalaman Trainer-Trainer HadSec yang berprofesi sebagai
Professional Pentester.

Objectives : Dengan Menyelesaikan training ini diharapkan peserta bisa melakukan


melakukan Pengujian terhadap jaringan baik itu sebagai internal Pentester maupun
eksternal Pentester.

Target Audience: Sysadmin, Security enginer,:


 Corporate networks
 Security Enginer
 Prepare Become Pentester

Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta 1
HadSec-NetPen[N101]

No Chapter Objective

Introduction Penetration Testing

1 Chapter 1 Introduction Penetration Testing

2 Chapter 2 Penetration Testing Phase

3 Chapter 3 How Setup Lab Preparation

Windows Pentesting

5 Chapter 4 Vulnerabilities on Windows Environment

6 Chapter 5 Misconfigurations on windows Software

7 Chapter 6 Applied Social Engineering

8 Chapter 7 Reverse Shell for bypass Firewall

9 Chapter 8 Payload Tunneling over HTTP/HTTPS

10 Chapter 9 Open Port Detection With Automatic Outbound

11 Chapter 10 Port Forwarding For Jumping Target

12 Chapter 11 Pivoting (on Nat Network)

13 Chapter 12 Reverse Connect through Pivots

Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta 2
14 Chapter 13 Bypass Anti virus With manual Technique

15 Chapter 14 Escalation Privileges and Bypass Uac

12 Chapter 15 Hash Dumping For User Password

16 Chapter 16 Remote Network Monitoring

17 Chapter 17 Desktop and Windows Sessions

18 Chapter 18 Impersonation token On windows

19 Chapter 19 Wevtutil for Log Management

20 Chapter 20 Post Exploitation With Wmic

21 Chapter 21 Make Custom Backdoor Shell Bind

22 Chapter 22 Bind Shell Payload Custom

23 Chapter 23 Bitsadmin

24 Chapter 24 Recovery Password From Browser

25 Chapter 25 Browser Master Password Dictionary attack

26 Chapter 26 Reverse Connect through Pivots

27 Chapter 27 Brute force over ssh

Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta 3
28 Chapter 28 Escalation Privileges and Bypass Uac

29 Chapter 29 Hash Dumping For User Password

30 Chapter 30 Remote Network Monitoring

31 Chapter 31 Desktop and Windows Sessions

32 Chapter 32 Impersonation token On windows

33 Chapter 33 Wevtutil for Log Management

34 Chapter 34 Post Exploitation With Wmic

35 Chapter 35 Make Custom Backdoor Shell Bind

36 Chapter 36 Bind Shell Payload Custom

37 Chapter 37 Laughing with hydra

38 Chapter 38 Laughing with Medusa

39 Chapter 39 Ncrack master bruteforce

40 Chapter 40 Proxy as tempering packet

41 Chapter 41 Burp Suite Powerfull Proxy tampering

42 Chapter 42 DNS Poisoning With the Hosts File

Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta 4
43 Chapter 43 Veil Framework For Evasion Anti Virus

44 Chapter 44 Metasploit Loader For Evasion Anti Virus

DLL Creation

45 Chapter 45 Run Meterpreter on multi Arch DLL

46 Chapter 46 Running Metasploit Loader As a DLL

47 Chapter 47 Hijacking creation DLL

48 Chapter 48 Meterpreter DLL Hijacking with DLLManager

49 Chapter 49 Bind Shell Payload Custom

50 Chapter 50 Reverse Dll Technique with Debugger

51 Chapter 51 Exploiting VLC Using DLL

52 Chapter 52 DTools For Hijacking DLL

53 Chapter 53 Evasion Anti Virus With Power Shell

54 Chapter 54 DLL Injection using AppInit_DLLs

55 Chapter 55 Firefox Addon Attack

56 Chapter 56 Stripping Manifest Files for DLL Hijacking

Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta 5
57 Chapter 57 Perpetual Meterpreter

58 Chapter 58 Perpetual Meterpreter

Anti Forensic Safety Creation

59 Chapter 59 Prefetch Directory On Windows

60 Chapter 60 Windows Prefetch make disable

61 Chapter 61 0wning Windows Prefetch with Meterpreter

62 Chapter 62 Dumping Memory and analisys

63 Chapter 63 Broser Memory Stealth Password with Dumping

64 Chapter 64 Dumping Logon Credentials from Memory Dumps

65 Chapter 65 Dumping Process Memory with Volatility

Hadsec.com
Jl. Proklamasi, pondok CC, Depok, Sleman, Yogyakarta 6

Anda mungkin juga menyukai