Cyber Attacks and Penetrations

Latest Hacking methodologies- Workshop

Main Speaker

Learning Tracks

Course ID

42597

Date

02/12/2024

Time

Daily seminar
9:00-16:30

Location

John Bryce ECO Tower, Homa Umigdal 29 Tel-Aviv

Overview

This seminar is designed to teach mid-level security practitioners how to engage all functional levels within the enterprise to deliver information system security. To this end, the course addresses a range of topics, each of which is vital to securing the modern enterprise.

Who Should Attend

  • Workers in IT industry
  • Workers in information security industry
  • Anyone who interested in information security industry

Prerequisites

  • Basic knowledge in PC environment

Course Contents

  • Buffer Overflows
  • Introduction to fuzzing
  • Introducing vulnserver
  • Fast-Track
  • Social Engineering Toolkit
  • Linux
  • Important directories and files
  • Important commands
  • Enumeration
  • Exploitation
  • Available tools on the remote system
  • Finding network information
  • Determine connections
  • Checking installed packages
  • Package repositories
  • Programs and services that run at startup
  • Searching for information
  • History files and logs
  • Users and credentials
  • Moving the files
  • Microsoft Windows post-exploitation
  • Important directories and files
  • Enumeration
  • Exploitation
  • Networking details
  • Finding installed software and tools
  • Pivoting
 

The conference starts in

Days
Hours
Minutes
Seconds