Improve their skill in the hacking

About the Program

This training program is perfect for those who want to improve their skill in the hacking. Many
certifications like OSCP, ECPPT v2 and even Hackthebox certification provides a good level of skills in hacking. So a working professional or students who want to grow their skills in hacking can choose this program.

During working in a company if an employee wants to achieve higher cyber security certifications to grow their skills and designation in the company then this becomes a very challenging task. And students who are currently completing their bachelor degree from a university or college and want to grow in the cyber security domain, they would also need some mentor to guide them & plan for their better future in cyber security. That’s the reason why GIS Consulting has designed this curriculum. We help these types of aspirants so that they can grow and gain their desired place in a company or organisation.

Why should you consider our training?

The purpose of this training is only to teach high and required level of hacking, so that a company employee who is taking training from us can think more to protect their organisation environment. Also, for both (student and an employee), this training will help them to target multiple high level certifications and using those certifications students and a working professional can grab a high level of job and their designation.

Topics that we will cover in our training program will upgrade your hacking skills. Upon completion of this training program, you can perform a high level penetration testing for a website and its subdomains and nearly all types of network based hacking, Web hacking, network hacking and also privilege escalation that is demanded in a high level of skill for a company and all this type of skill is provided by our training.

We are providing CTF lab machines for a real hacking environment as well as for a certification exam(Hackthebox level machines). First we will train you and enable you to hack those CTF on your own then we will provide multiple challenges as a certification exam for 24 hours to confirm that you are able to target a high level certifications or not. We will give you multiple challenges to the end of training for better performance from your side.

Table of Contents

Before we Begin …………………………………………………………………………………………...

i. Legal Stuff ………………………………………………………………………………………………..

iii. Reporting  ………………………………………………………………………………………………..

  1. Module 1 – Kali Linux Basics ……………………………………………………………………..

1.1 Working with kali linux ……………………………………………………………………………...

1.2 Updating system and packages ………………………………………………………………...

1.3 Apache …………………………………………………………………………………………………..

1.4 Other HTTP services ………………………………………………………………………………..

1.5 FTP ……………………………………………………………………………………………………….

1.6 SSH ……………………………………………………………………………………………………….

  1. Module 2- Information Gathering Techniques………………………………………………

 2.1  Google Hacking ……………………………………………………………………………………...

2.2  Netcraft and Whois Reconnaissance ………………………………………………………...

2.3  Open Source and third party  websites for information gathering…………………...

  1. Module 3- Open Services Information Gathering …………………………………………

   3.1 DNS Reconnaissance ……………………………………………………………………………...

 3.2 SNMP reconnaissance ……………………………………………………………………………..

 3.3 SMTP reconnaissance ……………………………………………………………………………..

 3.4 Microsoft Netbios Information Gathering ……………………………………………………..

  1. Module 4- Port Scanning ……………………………………………………………………………

 4.1 TCP Port Scanning  ………………………………………………………………………………...

 4.2  UDP Port Scanning  ………………………………………………………………………………..

 4.3 Working with tools …………………………………………………………………………………...

4.3.1  Nmap ……………………………………………………………………………………………...

4.3.2  Sparta ……………………………………………………………………………………………..

4.3.3  Netcat ……………………………………………………………………………………………..

  1. Module 5- Transferring Files ………………………………………………………………………

 5.1 Transferring files using netcat ………………………………………………………………….

5.2  Using FTP …………………………………………………………………………………………….

5.3  Using SSH …………………………………………………………………………………………...

5.4  Using Python HTTP server ……………………………………………………………………..

  1. Module 6 – Exploit frameworks ………………………………………………………………….

 6.1  Metasploit …………………………………………………………………………………………….

 6.2 Core Impact …………………………………………………………………………………………..

  1. Module 7- Password Attacks ……………………………………………………………………..

 7.1 Online Password Attacks ………………………………………………………………………..

 7.2 Hydra …………………………………………………………………………………………………...

 7.3 FTP Bruteforce ……………………………………………………………………………………...

 7.4 POP3 Bruteforce …………………………………………………………………………………...

7.5 SNMP Bruteforce …………………………………………………………………………………..

7.6 VPN Bruteforce ……………………………………………………………………………………...

7.7  Offline Password Attacks ………………………………………………………………………..

  1. Module 8 – Web Application Attack vectors ………………………………………………..

 8.1  Cross Site Scripting ………………………………………………………………………………..

 8.2  Local and Remote File Inclusion……………………………………………………………….

 8.3  SQL Injection in MSSql / MySQL ……………………………………………………………..

 8.4  Web Proxies ………………………………………………………………………………………….

 8.5 Modern web attacks and their exploitation ………………………………………….

  1. Module 9- Buffer Overflow Exploitation ………………………………………………………

 9.1 Fuzzing ………………………………………………………………………………………………...

9.2 Analyzing the Crash ……………………………………………………………………………….

9.3 Controlling EIP ……………………………………………………………………………………...

9.4 Buffer creation for our Payload………………………………………………………………...

9.5 Redirecting the execution flow ………………………………………………………………...

9.6 Finding return address …………………………………………………………………………..

9.7 Shellcode creation  according to OS ………………………………………………………..

9.8  Gaining  shell ……………………………………………………………………………………...

  1. Module 10- Working With Exploits ……………………………………………………………

 10.1 Checking an exploit in kali linux …………………….……………………………...

 10.2 Looking for exploits on the web ……………………………………………………………….

 10.3 Changing exploits according to target ……………………………………………..

Testimonial

What people are saying

Jaspal Singh

Outstanding and inexplicable services were received by us as a Stellar from GIS consulting team for the ISO 27001 implementation and Cybersecurity. It would,indeed, have become a major hurdle for us to obtain this most desired certification if we hadn’t got accompanied by this incredible consultancy team of professionals. To be honest, the team members present in GIS consulting team are extremely high knowledgeable, professional and skilled. A special and big thanks to Mr. Naveen Dham, for being with us everytime we felt struggled while implementing any stuffs related to infosec. Hats off.

Jaspal Singh, Sr. Quality & Compliance, Stellar Data Recovery,
Ashish Agarwal

Strength of Global IS Consulting lies in their team of seasoned professionals led by their CEO who has helped Interglobe in strengthening it’s security posture by conducting regular vulnerability assessment and penetration testing to help us secure our environment.

Ashish Agarwal, Assistant Manager, Interglobe Enterprise Ltd,
Aditya Khullar

Thanks to Cybersecurity Team of Global IS Consulting who has been instrumental in protecting us from latest cyber threats through their extensive penetration testing done on our networks and financial webportals. We appreciate the remediation actions implemented by the team to make us compliant to PCI DSS Standard.

Aditya Khullar, Manager Information Security, Interglobe Enterprise Ltd.,
Sandeep Chauhan

Global IS Consulting is one of the most professional and committed consulting organization that we have come across. Helmed by Mr Naveen Dham, the company efficiently and effectively built a Management System based on IS 27001:2013 standard for our organization. The best part was the level of involvement and keen participation in all the activities pertaining to the certification process of the organization.

Sandeep Chauhan, DGM Quality, PL Engineering (Punj Lloyd Group),
Amandeep Bawa

Thanks to CEO of Global IS Consulting for helping us achieve ISO27001 Certification by indepth implementation and maintaining it for last 5 years in row. Appreciate the professional approach, dedication and massive knowledge carried by the team.

Amandeep Bawa, IT Head, Panasonic India Pvt Ltd, Corporate Office Gurgaon,
Durgesh Upadhyaya

We appreciate the support provided by CEO of Global IS Consulting; Mr. Naveen Dham for helping us achieve ISO 27001 and every year ISMS maintenance provided for real time compliance to ISO 27001 standard

Durgesh Upadhyaya, Admin Head, Panasonic India Pvt Ltd, Corporate Office Gurgaon,
Navjeevan Kumar

Global IS Consulting is a group of experienced, talented and committed professionals. The CEO of the organization with his team has always shown his best in every project handled by them in the past. He has been instrumental in certifying our client Aircel for ISO 27001:2013 and maintaining it for last 3 years.

Navjeevan Kumar, Head Infra, Wipro Infotech Ltd.,
Sandhya Khamesra

CEO of Global IS Consulting, Naveen Dham is very professional in his work. He has an indepth knowledge of ISO 27001, PCI DSS, ISO 20000 and various other IT Standards and is able to quickly adapt the requirements of the standards required with what the client wants to accomplish, resulting in a lot of value addition to the clients. He has a wide variety of implementation scenarios in his background that he can draw information from. We highly recommend Naveen for any ISMS, ITSMS, PCI DSS and cybersecurity consultation projects.

Sandhya Khamesra, North Business Head, BSI Group,
Rumila

Hats off to CEO of Global IS consulting who has been maintaining our ISO 27001 & ISO 20000 standard maintenance since our inception. Their Cybersecurity experts have been instrumental in protecting us from latest cyber threats through their extensive penetration of our network and patching them in time.

Rumila, Senior Vice President, Silaris Informations Pvt. Ltd.,
get in touch
We are accepting new projects

GIS Consulting was incorporated with Mission to Empower Customers, effectively manage their "Digital Assets", to protect, comply and grow the business profitably, in the Data, Network and Application (DNA of every business) protection and management space.

Get in touch with our experts for all your Information Security Needs.

    Clients

    Happy business industry Clients

    whatsapp