Advanced Infrastructure Hacking (AIH) – Outline

Detailed Course Outline

Day 1

Hacking Networks, Databases

“Lets begin – we start to warm up, get our minds into that of a hacker, scan, enumerate, crack passwords and exploit databases.”

  • 1.1 TCP/IP & Network Enumeration
  • 1.2 Port scanning
  • 1.3 TCP/UDP scanning
  • 1.4 Windows/Linux enumeration
  • 1.5 The Art of brute-forcing
  • 1.6 Insecure SNMP Configuration
  • 1.7 Database Exploitation (Oracle, Postgres, Mysql)
  • 1.8 Hacking Application servers (Websphere)
  • 1.9 Exploiting SSL vulnerabilities such as heartbleed
  • 1.10 Exploiting remote systems via Shellshock
  • 1.11 Exploiting Java and PHP serialization bugs
Day 2

Advanced Windows Hacking

“Turning our attention to Windows, we examine local and remote exploits, privilege escalation and hack Windows credentials.”

  • 2.1 Windows Vulnerabilities
  • 2.2 Mastering Metasploit
  • 2.3 Latest remote exploits
  • 2.4 Pivoting within internal network
  • 2.5 Local privilege escalation
  • 2.6 Custom payloads
  • 2.7 Post-exploitation
Day 3

Hacking Windows Domains

“We continue working on Windows on day 3 and dive into various ways to perform remove exploits including focusing on compromising the Domain Controllers.”

  • 3.1 Compromising Windows Domain
  • 3.2 Pass the hash
  • 3.3 Pass the ticket
  • 3.4 Breaking Kerberos
  • 3.5 Third party exploits (browser, java, pdf)
Day 4

Advanced Linux Hacking

“We dive into Unix vulnerabilities, both local and remote exploits, using permissions and services to our advantage.”

  • 4.1 Linux Vulnerabilities
  • 4.2 Finger
  • 4.3 Rservices
  • 4.4 NFS Hacks
  • 4.5 SSH hacks
  • 4.6 X11 vulnerabilities
  • 4.7 Local Privilege escalation
  • 4.8 Kernel exploits
  • 4.9 Weak file permissions
  • 4.10 SUID/SGID scripts
  • 4.12 Inetd services
Day 5

Hacking VLANs, VoIP, Switches & Routers

“Ever thought that VPNs, VoIP and VLANs are secure? We examine how such services are compromised and step out of the box.”

  • 5.1 VLAN Hopping
  • 5.2 Hacking VoIP
  • 5.3 Exploiting insecure VPN configuration
  • 5.4 Switch/Router vulnerabilities