What are the benefits of performing network penetration testing?
The overarching benefit to implementing network pen testing is that it allows a business to gain valuable insight into its overall security posture and empowers it to take informed action to resolve problems before a malicious actor has the opportunity to exploit its systems.
More specifically, network pen testing provides the following:
The ability to analyze and understand security posture and controls
The ability to prevent breaches before they can happen
Help in learning what to do in case of an actual attack by understanding how a system responds to hacking activities
Less time and money spent fixing damage caused by preventable attacks
Headline of content
- Pentesting Routers
- Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
- SNMP attacks
- Bypassing Firewalls
- Payloads and Shells
- HTTP/HTTPS tunneling
- Port Forwaring, Pivoting, Reverse Connects
- Privilege Escalation and UAC bypass
- Hash Dumping and Mimikatz
- Windows Sessions, Stations and Desktops
- Impersonation attacks
- WMIC post exploitation
- Hidden bind shells
- Bitsadmin
- Browser Password Recovery
- PAC Attacks
- DNS Poisoning
- Veil Framework and AV Evasion
- Metasploit Loader 32/64-bit
- DLL Hijacking basics
- DLL Hijacking and Meterpreter
- Privilege Escalation via DLL Hijacking
- DLL Injection using Appinit_DLLs
- Stripping Manifest Files for DLL Hijacking
- Attacking with DLL Forwarding
- Anti-Forensics techniques
- Memory Dumping and Analysis