Master of Penetration Testing Using Kali

Course Content

Module 1: Sniffing and Spoofing

  • About Sniffing and Spoofing
  • Using Mac Changer Tool
  • Using Wireshark Tool
  • Using Ettercap Tool
  • Using Netsniff-ng Tool
  • Using MITMProxy and Driftnet

Module 2: Social Engineering Attacks

  • About Social Engineering Attack
  • Using Maltego Tool
  • Trojan Creation using SET
  • Phishing using SET
  • Using BeEF

Module 3: Wireless Attacks

  • About Wireless Attack
  • Monitor Mode
  • Using Fern Tool for WEP Attack
  • Using Crunch Tool
  • Using Fern tool for WPA2 Attack

Module 4: Forensics tools

  • About Forensics
  • Using FTK Imager tool
  • Using Guymager tool
  • Using Autopsy Tool
  • Using bulk_extractor
  • Using Hashdeep
  • Memory Analysis using volatility

Module 5: Exploitation

  • Metasploit Introduction
  • Windows10 Exploitation using Trojan
  • Antivirus Bypass Frameworks
  • Windows10 Defender Bypass
  • Windows10 Antivirus Bypass

Module 6: Post Exploitation

  • About Post Exploitation
  • Access Meterpreter Session
  • Keylogger Attack
  • Windows10 Privilege Escalation
  • Stealing Windows10 Passwords

Module 7: Reporting Tools

  • Using Cutycapt tool
  • Using Pipal tool
  • Using Dradis tool

Laptop requirements

Important! Set up your own system according to these guidelines.
To effectively engage in this course, your system must be properly configured. If you do not properly read and follow these directions, you will be unable to fully engage in the course’s hands-on tasks. Please ensure that you are available with a system that meets all of the mentioned requirements.Make a backup of your system before attending class. Better better, use a system that does not contain any sensitive or critical data. Dark ExploiT is not liable for your system or data.

MANDATORY WAPT SYSTEM HARDWARE REQUIREMENTS

CPU: 64-bit Intel i5/i7 (8th generation or later), or Ryzen equivalent. This class requires an x64-bit processor with a clock speed of 2.0 GHz or above.CRITICAL: Apple Silicon devices cannot execute the required virtualization and so cannot be used for this course.BIOS settings must be changed to allow virtualisation technologies, such as the “Intel-VTx” or “AMD-V” extensions. If your BIOS is password protected, make sure you can access it in case you need to make modifications.At least 8GB of RAM is necessary.At least 50GB of free storage space is required.There is at least one accessible USB 3.0 Type-A port. A Type-C to Type-A converter may be required for modern laptops.Some endpoint protection software does not allow the usage of USB devices, so test your system with a USB drive before class.Wireless networking (802.11) is required. There is no wired internet access in the classroom.

You cannot copy content of this page