Network and Penetration Testing

Learning objectives

The participants know the dangers of network attacks. They are able to check their company independently for weak spots and can introduce and apply the corresponding countermeasures.

Highlights

  • Information gathering (Google, Website, WHOIS)
  • Port Scanning, Vulnerability Scanning, Exploitation, Elevation of Privileges
  • OSSTMM process description for penetration tests
  • Sniffing, ARP spoofing
  • Tunneling Mechanisms (HTTP Tunnel, DNS Tunnel)
  • Voice over IP and remote access threats
  • Hands-on with Nessus, Metasploit, Nmap, etc

 

Demarcation: This course primarily treats attacks on the network and system levels. The attacks on web applications will be taught in the Web Application Security courses. Analysis and monitoring of logs will be treated in the courses on forensics and APT analysis.

Target group

  • Security Officers
  • Network Administrators/Engineers
  • Unix/Windows Administrators
  • Firewall Administrators/Engineer

 Prerequisite

  • Familiarity with the Windows command line
  • Basic knowledge of network protocols (TCP/IP)
  • VoIP, VLAN, ARP, DNS should be familiar concepts

CALENDAR

Security Training: Secure Mobile Apps

In the 2-day course (in German) from October 20/21, 2020, you will learn about the most important security problems of mobile apps. Read more

Security Training: Social Engineering

In the 2-day course (in German) from December 1/2, 2020, you will get to know and understand the methods, tools and tricks of social engineering. Read more

ALL DATES

NEWS

Vulnerability in Mailster

Thierry Viaccoz identified an XSS vulnerability in Mailster (email newsletter plugin for WordPress). Read more

Secure Payments on th Internet

More and more goods and services are bought and paid on the internet. Ivan Bütler summarizes security relevant information on online shopping and... Read more

Vulnerability in Froala WYSIWYG HTML Editor

Security Analyst Emanuel Duss identified a DOM XSS vulnerability in the Froala WYSIWYG HTML Editor Read more

ARCHIVES

Compass Security Blog

Yet Another Froala 0-Day XSS

Compass found a DOM-based cross-site scripting (XSS) in the Froala WYSIWYG HTML Editor. HTML code in the editor is not correctly sanitized when inserted into the DOM. This allows an attacker that can... mehr

Relaying NTLM authentication over RPC

Since a few years, we - as pentesters - (and probably bad guys as well) make use of NTLM relaying a lot for privilege escalation in Windows networks. In this article, we propose adding support for... mehr

ZUM BLOG