Privia Security was chosen as one of Türkiye's fastest growing companies!
The Power Behind Industry Leaders
Our corporate training program is comprehensively designed to equip participants with in-depth knowledge of white-hat hacking concepts, techniques, methodologies, and their practical applications across various domains. Throughout the training, participants will gain a solid understanding of security systems, ethical hacking techniques, penetration testing, vulnerability assessments, security protocols, and best practices to be followed in cybersecurity.
By the end of the program, participants will have the necessary knowledge to conduct penetration tests using industry-recognized methodologies. They will be well-prepared to take certification exams such as SANS GPEN or CEH. The training is scheduled on weekdays or weekends and is completed over the course of 5 days. Upon completion, participants receive a wet-signed Privia Security Certificate of Participation.
Individuals who wish to participate in the training are expected to possess certain fundamental competencies. These prerequisites are defined to ensure that participants can complete the program efficiently and effectively:
Our corporate training program is designed for professionals looking to enhance their ethical hacking and offensive cybersecurity skills.
Our cybersecurity training programs aim to raise organizational awareness by enhancing employees' understanding and consciousness of information security.
1200+
Hour Training
300+
Enterprise Customer
100+
Technical Publication
22.000+
Total Subscribers
Threat, Vulnerability, Risk, Exposure
Definitions: Threat, Vulnerability, Risk, Exposure
Types of Attacks: Active Attack, Passive Attack, Insider Threat, External Attack
Concept of Ethical Hacking and Penetration Testing
Types of Ethical Hacking and Penetration Tests:
Network Security Testing
Web Application Testing
Client-Side Testing
Wireless Security Testing
Limitations of Ethical Hacking and Penetration Testing Approaches
Alternative Approaches for Identifying Security Vulnerabilities
Overview of Testing Methodologies:
OSSTMM
NIST 800-42
OWASP
Penetration Testing Execution Standard (PTES)
Common Tools and Exploit Resources for Ethical Hacking
Test Environments and Operational Considerations
Overview of Ethical Hacking and Penetration Testing Phases
Scoping and “Rules of Engagement” in Penetration Testing
Step-by-Step Testing Methodology in Ethical Hacking
Reporting Process:
Essential Report Content
Key Considerations
Legal and Compliance Considerations During Testing
First Phase of Ethical Hacking: Information Gathering
Asset Inventory within Scope
Search Engine and Web-Based Reconnaissance
Whois Enumeration
IP Block Allocation and Regional Internet Registries (ARIN, RIPE, etc.)
DNS Enumeration (nslookup, recurse/norecurse queries, dig, zone transfer)
Information Gathering with Maltego
Google Hacking and GHDB (Google Hacking Database)
Scanning Phase and Scanning Techniques
Introduction to Scanning Techniques
Tips and Best Practices During the Scanning Phase
Using Sniffers During Scanning: Benefits and tcpdump
Overview
Network Scanning Tools: Angry IP Scanner and ICMPQuery
Scanning with Hping: Advanced Packet Crafting and Reconnaissance
Network Tracing: Traceroute and Network Path Mapping
Understanding TCP & UDP Protocols: Impact on Port Scanning Strategies
Introduction to Advanced Port Scanning with Nmap:
Packet Trace Analysis
Timing Options
Ping and Traceroute Integration
Nmap TCP Scanning Methods:
TCP Connect Scan
SYN (Stealth) Scan
ACK Scan
FTP Bounce Scan
UDP Port Scanning with Nmap
OS Fingerprinting Techniques:
Active Methods
Passive Techniques
Version Detection: Identifying Service Versions Using Nmap and Amap
Approaches to Vulnerability Scanning
Overview of Nmap Scripting Engine (NSE)
Script Categories
Practical NSE Usage Examples
Scanning with Nessus: Setup and Execution
Nexpose: Installation, Configuration and Vulnerability Assessment
Overview of Other Vulnerability Scanners
User Enumeration Techniques:
Windows Null Session
Finger Service
LDAP Enumeration
Advanced Netcat Usage Scenarios:
Remote Shell Access
File Transfer
Port Listening and Redirection
Exploitation & Privilege Escalation
Definition and objectives of exploiting vulnerabilities.
Real-world examples and impact of exploit execution.
Server-Side Exploits: Targeting services and daemons.
Client-Side Exploits: Leveraging user interaction (e.g., browser-based or document-based).
Local Privilege Escalation: Gaining elevated privileges on compromised systems.
Architecture and purpose of Metasploit in ethical hacking.
Setting up and launching exploitation environments.
Exploit: Delivery mechanism for vulnerabilities.
Payload: Code executed on the target system.
Stager: Initial code loader for complex payloads.
Stage: Main payload component delivered by the stager.
Capabilities of the Meterpreter payload.
Interactive shell, system control, pivoting, screenshot, and keylogging features.
Manual exploitation techniques using public PoC (Proof of Concept) code.
ExploitDB, GitHub, and other reliable sources.
Common post-exploitation shell issues (e.g., limited shell, broken encoding).
Solutions: Upgrading to fully interactive shell, PTY allocation.
File redirection, port forwarding, reverse shells.
Practical multi-host attack simulations using nc
.
File Transfer Techniques: certutil, PowerShell, FTP, SMB shares.
Data Gathering on Compromised Hosts:
Enumeration of users, privileges, and network configurations.
Extraction of credentials, tokens, and browser data.
Utilizing tools like:
PsExec
at
scheduler
schtasks
sc
wmic
Using WMIC
, PowerShell
, Netsh
, and Reg
for stealthy operations.
Living-off-the-land binaries (LOLBins) usage.
Delivering malicious payloads via:
Malicious PDFs, Office Macros, or browser exploits.
Practical Exercise: Exploiting a vulnerable PDF reader or browser using Metasploit.
Password Attacks
Fundamental approaches to password brute-forcing and dictionary attacks.
Strategies to optimize attack success and reduce false positives.
Best practices and methodologies for different attack vectors.
Bypassing account lockout and implementing delay logic.
Windows: Account Policy, Lockout Threshold, Audit Logs.
Linux/Unix: PAM (Pluggable Authentication Module) configurations, faillog
, pam_tally2
.
Using Hydra for brute-force and dictionary attacks over protocols like SSH, FTP, HTTP, SMB.
Filtering and preparing custom wordlists for password attacks.
Structure and location of password hashes in the Security Accounts Manager (SAM) database.
Storage of NTLM hashes in NTDS.dit.
Secure channel communication and replication issues.
LANMAN (LM): Weak hash algorithm, case-insensitive, padding mechanisms.
NT Hash (NTLM): MD4-based hashing, Unicode support.
LANMAN Challenge/Response
NTLMv1 and NTLMv2 Challenge/Response
Microsoft Kerberos Authentication Workflow
/etc/shadow
file structure.
Hashing algorithms used: MD5, SHA-256, SHA-512, bcrypt.
Tools and techniques:
Pwdump6
, Fgdump
, Mimikatz
, Metasploit’s hashdump
and priv
modules.
Introduction to JtR as a password cracking utility.
Configuration: john.conf
or john.ini
files.
Modes: Single crack, wordlist, incremental, external.
Output Files:
john.pot
: Cracked passwords storage.
john.rec
: Recovery checkpoint file.
MPI/OpenMP support.
Use of john --fork
, john --node
, and GPU acceleration.
Graphical password recovery and sniffing tool.
Features:
Sniffer Module for traffic interception.
ARP Poison Routing to perform MITM attacks.
Hash extraction and injection capabilities.
Concept of precomputed hash chains.
Trade-offs: storage vs. computation.
Generation and usage with tools like rtgen
, rcrack
.
GUI and live CD support for automated hash recovery.
Real-time NTLM hash cracking demonstrations.
Authentication without knowing plaintext passwords.
Tools:
Pshtoolkit
for Linux-based PtH.
Metasploit
modules for remote hash injection.
SMBClient
, WMI
, and WinRM
for lateral movement using hashes.
Wireless Networks & Web Applications
Common weaknesses in Wi-Fi environments, including authentication bypass, encryption flaws, and rogue access points.
Wireless NICs supporting monitor mode and packet injection (e.g., Alfa AWUS036ACH).
Directional and omnidirectional antennas.
GPS modules for geolocation tagging.
IEEE 802.11b/g channel allocation and frequency bands.
SSID broadcasting and suppression.
802.11 authentication and association handshakes.
Interface modes: Managed vs. Monitor.
Passive and active scanning strategies.
Capturing and analyzing 802.11 frames.
Real-time packet capturing, client/AP mapping, and signal analysis.
Windows-based tools for access point identification and signal strength measurement.
Hiding network names and its implications on security and detection.
Basics, encryption weaknesses, IV reuse vulnerabilities.
Pre-shared key (PSK) and enterprise mode.
Temporal Key Integrity Protocol (TKIP) vs. AES-CCMP.
Aircrack-ng suite for cracking WEP/WPA handshakes.
CoWPAtty for dictionary-based attacks on WPA.
Rogue AP and Evil Twin attacks.
Airpwn, AirJack, Karma, Karmasploit for client spoofing, session hijacking, and MitM.
Architecture and common technologies (HTTP, HTTPS, cookies, sessions).
Default configurations, outdated software, and information disclosure.
Automated tool for discovering misconfigurations and outdated versions.
Validating discovered issues through manual HTTP requests.
Intercepting and modifying HTTP requests/responses.
Integrated scanner and request editor.
Built-in hash calculator and parameter analyzer.
Forging authenticated requests from a victim browser.
Reflected XSS: Input echoed immediately.
Stored XSS: Persistent injection in databases or logs.
Executing system-level commands via unsanitized input.
Blind Command Injection: Output not visible to attacker.
Modifying backend SQL queries via user input.
Executing system commands through SQLi.
Blind SQL Injection: Infer data via boolean/time-based techniques.
Meet the expert team at Privia Security and let us conduct the essential initial analysis to elevate your organization’s cybersecurity maturity.