Praha (34 500 Kč)
Brno (34 500 Kč)
Bratislava (1 500 €)
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform. At least half of the time that the students spend in the classroom is dedicated for hands-on practical exercises. Students practice attacks against the Active Directory, DNS and DHCP server, SMB/CIFS servers and clients, VPN connections, Wireless networks, SSL protected servers and others. Students will capture the user credentials and other traffic from wired (switched), wireless as well as WAN connections. We will explain in great detail the misuse of passwords and hashes and use encryption cracking technics such as brute-force, rainbow tables, dictionary attacks and distributed attacks using clusters and graphical cards. The goal of the training is to provide attendees with precise understanding of common vulnerabilities found in Windows based networks and teach how to prevent such attacks and harden the network. The course is taught by our top level security professional (MCT, MCSA, MCSE, MCITP, CEH) who specializes on security auditing, infrastructure security assessment and hardening.
Introduction
• Repeating the TCP/IP stack
• Capturing data
in a network analyzer
• Searching information from Internet sources
• How to start malware or manual attacks using services to start
mission critical tasks
Analysis of the environment and the first attacks
• Analysis of the
environment susceptible to social engineering
• Scanning network
services by scanning for open ports and banners
• The enumeration of
operating systems and services
• Explanation and attacking well
chosen targets using the ARP poisioning using both Microsoft Windows and Linux
operating systems
• Defensive countermeasures
Passwords and breaking
• Principles of storing passwords in
operating systems
• Transferring passwords for network authentication
• Authentication methods downgrade
• The attacks on passwords
using brute force CPU, graphics cards and distributed attack
• Rainbow
Tables - principles of searching, a method of generating specific environments
and types of attacks, the time / memory tradeoff effect
Wireless Networks
• Types of frames used in wireless networks
• Analysis of wireless networks in range
• Misuse of
unauthorized frames
• Injection and monitor mode of WiFi cards
• Attacks on WEP networks
• Attacks on WPA1 PSK and WPA2 PSK
network
• Breaking EAPOL frames using graphics cards
• Alien
APs
• WPS
Advanced attacks
• Sending fake certificate, importing the fake
root certificate authorities and the creation of fake certificates for breaking
the HTTPS security
• Stripping the SSL protocols
• Exploitation
of remote unknown systems
• Hiding your tools and backdoors using
rootkits
The prices are without VAT.