Social Engineering & Insider Threats
Session Title | 5 Phases of Hacking.
In this workshop, we will learn how to conduct an effective Penetration Testing Methodology, starting from host discovery to owning a target machine with basic and advanced methods.
- Types of hacker and vocabulary
- Whats ROE
- Scanning Layer 2 / Layer 3 / Layer 4
- Enumerate service
- Scanning vulnerability
- Exploit vulnerability
- Privilege escalation
- Cover track
- Bypass firewall rule
- Bypass AV through social engineering attack
- Detailed guide to Nmap tool
- Detailed guide to Metasploit