fbpx

Hesham Mahmoud Abdelfattah

Information Security Engineer at ISEC

Social Engineering & Insider Threats

Session Title | 5 Phases of Hacking.

In this workshop, we will learn how to conduct an effective Penetration Testing Methodology, starting from host discovery to owning a target machine with basic and advanced methods.

Workshop outline:

  • Types of hacker and vocabulary
  • Whats ROE
  • Scanning Layer 2 / Layer 3 / Layer 4
  • Enumerate service
  • Scanning vulnerability
  • Exploit vulnerability
  • Privilege escalation
  • Cover track
  • Bypass firewall rule
  • Bypass AV through social engineering attack
  • Detailed guide to Nmap tool
  • Detailed guide to Metasploit
  • Bug Bounty Hunter @Hackerone & @BugCrowed
  • He has more than 3 years of experience in Network penetration testing, mobile application penetration testing, network vulnerability assessment, Incident Handling, Malware Analysis
  • Hesham trained More than 1000 Students from Around the Arab world and India
  • He is an instructor @Udemy and an Ec-Council Certified Instructor
  • Certificates: CCNA - CCNA Security - Security+ - Pentest+ - CEH - ECSA - ECIHv2 - eJPT
TOP