Advanced Ethical Hacking Training

Advanced Ethical Hacking Training


Advanced Ethical Hacking Training course with real world hands-on labs

Modern networks and systems are fully patched, hardened from attack, and armored to the hilt with expensive security gear --- but the bad guys still get in on a daily basis! How do they do this? Why is there a news release every day of another Fortune 500 company hacked, more government secrets lost to the adversary?

ENO’s Advanced Ethical Hacking Training Boot Camp aims to train you on how to successfully attack fully patched and hardened systems, how to circumvent common security controls, and how to get to confidential data. This is all possible if you have 0day exploits, or the ability to create your own exploit code. In this Advanced Ethical Hacking Training class, you will learn how to exploit modern operating system protections, such as ASLR and DEP, using ROP attacks, egghunter shellcode and heap spraying. You take this knowledge back to your organization and can then formulate a way to defend against these sophisticated attacks.

Customize It:

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

Audience/Target Group

• IT professionals involved with information system security, computer forensics, and incident response

Advanced Ethical Hacking TrainingRelated Courses:

Duration: 5 days

Skilled Gained:

• Create 0day (private unreleased exploits) attacks as part of the “Advanced Persistent Threat”
• Run sophisticated attacks against client side applications
• Use fuzzers and dynamic analysis to discover vulnerabilities
• Reverse engineer binaries to find new vulnerabilities never discovered before
• Exploit secured web applications
• Run chained exploits to pivot from multiple exploitable systems
• Attack and defeat VPNs, IDS/IPS and other security technologies

Course Content:

Hackers are always changing their tactics to get one step ahead of the good guys. EnoGroups updates our course materials regularly to ensure that you learn about the most current threats to your organization's networks and systems. This course focuses on advanced exploitation techniques. A brief introduction to system exploitation theory and process will be covered, the rest of the course covers advanced topics, such as:

• Attacking fully patched systems
• Buffer Overflows against Windows 2008 Server, Windows 7 clients
• 0day attacks
• Attacking DMZs and other secured infrastructure
• Port Redirection
• Compromising secured infrastructure
• Using egghunter and meterpreter shellcode
• Metasploit scripting and automation
• NMAP automation
• Running exploits in RAM vs. on disk
• Hiding from IDSs
• Covert Channels
• Privilege Escalation attacks on Windows 7
• Advanced Man In The Middle Attacks
• Traffic Interception
• Hijacking SSL encrypted sessions
• MiTM VoIP attacks
• Intercepting VoIP traffic and attacking Ethernet enabled PBXs
• 0day vuln discovery process
• Format String attacks
• Windows SEH Stack Overflows
• Writing Windows Shellcode
• Heap Spraying / JIT Spraying
• Fuzzer selection and comparison
• Fuzzing with peachfuzz and SPIKE
• Binary Auditing with IDA Pro
• Portable Executable (PE) Compression and Encoding
• Using a Disassembler
• Anti-disassembling Detection circumvention
• Egghunter and ROP payloads
• Attacking SafeSEH
• Defeating ASLR, DEP
• Cross Site Request Forgery Attacks
• XSS Attacks and XSS Redirection
• RFI and Source Code Injection Attacks
• Proxy cache poisoning

Request More Information

    Time Frame: 0-3 Months4-12 Months

    Print Friendly, PDF & Email