Course Overview

This course brings it all together showing students how to perform an actual pentest and gain root access.  More importantly, students learn how to conduct a pentest using the hacker's methodology. 

We learned to walk before we could run and technology and pentesting are no different. This course is designed to introduce students to skills similar to what hackers use in real-life situations and obtain a greater depth of understanding of how vulnerabilities are exploited. 

Although there is no specific step-by-step methodology used by all hackers, a typical hacking process comprises of the following steps: 

Footprinting – the process of using passive methods of gaining information about the target system prior to performing the attack. 

Scanning – the process of taking information obtained from the footprinting phase in order to target the attack more precisely. Some of the methods used in this phase are port scans, ping sweeps, operating systems detection, observation of facilities used by the target, and so on. 

Enumeration – the process of extracting more detailed information about the information obtained during the scanning phase to determine its usefulness. Some of the methods used in this step are user accounts enumeration, SNMP enumeration, UNIX/Linux enumeration, LDAP enumeration, NTP enumeration, SMTP enumeration, DNS enumeration, etc. 

System hacking – the process of planning and executing the attack based on the information obtained in the previous phases. In this phase, the attacker performs the actual hacking process using hacking tools. 

Escalation of privilege – the process of obtaining privileges that are granted to higher privileged accounts than the attacker broke into originally. The goal of this step is to move from a low-level account (such as a guest account) all the way up to an administrator. 

Covering tracks – the process of removing any evidence of the attacker’s presence in a system. The attacker purges log files and removes other evidence needed for the owner of the system to determine that an attack occurred. 

Planting backdoors – the process of securing unauthorized remote access to a computer, so the attacker can access the system later without being detected. Backdoors are usually computer programs that give an attacker remote access to a targeted computer system. 

Students step through each of the Capture the Flags (CTF) walkthroughs looking for clues to help guide them. The clues will help the pentester find and exploit the target to gain root access. Each CTF demonstrates the techniques and hacking methodology used by pentesters, and hackers. 

The viewers who have completed the Ethical Hacking - Capture the Flag Walkthroughs V1 and V2  can now put to use what they have learned. You've seen the tools, heard all the war stories, and now learn ethical hacking like you've been wanting to. 

The necessary resources for this course are in the "Resources" section of Video 1.1. You can also access them through this direct link - https://github.com/ec-council-learning/Ethical-Hacking-Capture-the-Flag-Walkthroughs-v3

What You Will Learn

  • Build your own virtual lab environment
  • Various levels of CTF
  • How to use pentesting tools to enumerate and gain root access
  • Different attack vectors used to exploit a target

Program Curriculum

  • Creating a Virtual Install of Kali Linux Using VirtualBox
  • $7 Million Cybersecurity Scholarship by EC-Council

  • Lab Preparation
  • Scanning and Enumeration
  • Exploitation and Privilege Escalation

  • Lab Setup
  • CTF – SQL Injection to Shell Walkthrough
  • Chapter 3 Quiz

  • Lab Preparation
  • CTF Walkthrough - SQL Injection to Shell
  • Chapter 4 Quiz

Instructor

Cliff Krahenbill Krahenbill

Cliff Krahenbill has worked in technology since 1998 working as a Microsoft Support Technician, a Microsoft Certified Trainer, a technology support specialist, a Senior Network Technology Consultant, an IT Auditor and most recently as the owner and operator of his own technology firm, CLK Technology Solutions located in Tucson Arizona. Cliff's expertise in technology focuses on designing, building, supporting network infrastructures, and network security.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8