CTF Challenges Course 1712421174

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

TRAINING PROGRAM

CAPTURE THE FLAG

Advanced Hacking Course

ENROLL NOW

www.ignitetechnologies.in
ABOUT COURSE
CTF is the latest edition of our training which provides the most
advance modules that connect to the real infrastructures in the
organizations and also assist students/professionals to prepare for
global certification such as OSCP. This curriculum has been designed
in such a manner that it accommodates both freshers and specialists
and provides them with the necessary training w.r.t their skills.

Capture the Flag is an information security competition that is an


amalgamation of various challenges that applies concepts like
Reverse engineering, Web Applications, Binary, Network,
Cryptography, Forensics, etc. Each challenge holds a certain number
of points based on its difficulty level. The idea behind these CTFs is to
provide an individual practical knowledge of the different kind of
attacks and issues in the real world.

WHO NEEDS CTF


LEARNING?
If the candidate wants to achieve accreditation such CREST, OSCP,
and etc then need to solve CTFs that which is based on real time
scenario.

This course will focus on core concept that will the candidate the
tricks and techniques to solve the challenge.
IGNITE TRAINING OBJECTIVE
• Aid the candidate to have required skill for achieve the
global certification.

• Provide the accurate techniques to enhance


the pentest for Network, Web, Active Directory and
Privilege Escalation.

• Help to solve CTF through various platform such as


Offsec-labs, HTB, THM, Vulnhub and etc.

PREREQUISITES
Course Duration: 50 Hours (Tentative)
ABOUT COURSE
IGNITE
Well-Known Entity for Offensive Security
{Training and Services}

About us
With an outreach to over a million students and over
thousand colleges, Ignite Technologies stood out to be a
trusted brand in cyber security training and services

WHO

College Students WHY


IS/IT specialist, analyst, or manager
IS/IT auditor or consultant
Level up each candidate by providing the
IT operations manager
fundamental knowledge required to begin the
Network security officers and
Sessions.
Practitioners
Hands-on Experience for all Practical
Site administrators
Sessions.
Technical support engineer
Get Course PDF and famous website links for
Senior systems engineer
content and Tools
Systems analyst or administrator
Customized and flexible training schedule.
IT security specialist, analyst, manager,
Get recorded videos after the session for each
Architect, or administrator
participant.
IT security officer, auditor, or engineer
Get post-training assistance and backup
Network specialist, analyst, manager,
sessions.
Architect, consultant, or administrator
Common Platform for Group discussion along
with the trainer.
Work-in Professional Trainer to provide realtime
exposure.
Get a training certificate of participation.
HOW WE FUNCTION

Implement your own Sharing tools,


Pentest environment technique,
which will help to un- checklist
derstand the
backend functionality
and architecture.

Learn the Fundamental


fundamentals approach to solve
concept and work the CTF .
flow of CTF Chal-
lenges

COURSE INTRODUCTION
Objective: This module will define the OSCP Guidelines & holistic
approach to follow for OSCP preparation.

About the oscp exam pattern

Points breakouts of the Exam machines

Exam Preparation methodologies

Introduction to Note keeping tools

Introduction to Note and Chee sheet keeping methodologies

Information about the Exam and Lab Guidelines


NETWORK
ENUMERATION
Objective: This module will focus the enumeration of TCP & UDP
service to identify the loopholes and sensitive information to
proceed for Initial foothold.

FTP NFS Pentesting


SNMP
SMB Pentesting LDAP

Tools: Nmap & Scripts, Metasploit, Enum4linux, Ldapsearch,


Smbclient, Snmpwalk.

WEB APPLICATION ATTACKS

Objective: This module will focus on the web application


exploitation by injecting payloads and establishing initial footholds.

Web Application File Inclusion Vulnerabilities


Assessment Tools
File Upload Vulnerabilities
Web Application Enumeration
Command Injection
Web Shells and One-liner
payloads SQL Injection-Manual

Directory Traversal
WINDOWS EXPLOITATION &
PRIVILEGE ESCALATION
Objective: This module will focus on the basic utilities and,
dangerous permission, exploitation and privilege escalation.

Windows Powershell

Windows file Transfer

Windows Basic commands

MS-Office Macros Exploit

Windows Reverse shell & one-linear payloads

Post Enumeration

Unquoted Path ERROR 404


not found

Always Install Elevated

Scheduled Tasks

Kernel exploit

Tools: Powershell scripts,


Msfvenom, Revshell, Winpeas,
Macropack, Impacket-Smbshare,
Certutil.
PASSWORD ATTACKS
Objective: This module will focus on the password attack
technique and tools for remote login services.

Attacking Network Services Logins (Hydra, Crackmapexec)

Password Cracking Fundamentals (Crackstation, John, Hashcat)

Access the Services (SSH, SMB, RDP, FTP)

Tools: Hydra, Crackmapexec, Crackstation, John, Hashcat


HUNTING PUBLIC EXPLOITS
Objective: This module will focus on the how to hunt for the
exploit for vulnerable software packet in online and offline mode.

Offline Exploit Resources

Online Exploit Resources

Tools: Exploit-DB, PacketStromSecurity, Github, Searchsploit,


Nmap-NSE Script.

LINUX PRIVILEGE ESCALATION


Objective: This module will focus on the basic utilities and, dangerous
permission, exploitation and privilege escalation.

Fundamentals of Linux SSH RSA Key Authentication

Understanding Files and Linux Privilege Escalation


Users Privileges on Linux
Automated Post Enumeration
Manual Enumeration
Abusing Setuid Binaries
Abusing Cron Jobs
Abusing Sudo
Abusing Password
Authentication Exploiting Kernel Vulnerabilities

Tools: Netcat, Revshell, SSH-keygen, LOGIN


Gtfobin, openssl, Linpeas, wget.
PORT FORWARDING
& TUNNELING
Objective: The module is very important with respect to OSCP and
majorly part of insane labs where pentester need to perform lateral
movement and try to connect the machine of different network
through port forwarding and pivoting.

Port forwarding from Linux to windows


Port forwarding from Windows to Linux
Port forwarding Linux to Linux
Tunneling: Local, Remote and dynamic

Tools: : Proxychain, Chisel, SSH.

ACTIVE DIRECTORY
INTRODUCTION & ENUMERATION
Objective: : This module will focus on Active Directory Enumeration
and exploitation and Privilege Escalation.

Active Directory Kerberos Attack


Enumeration Pass the Hash-RDP
Lateral Movement Privilege Escalation

Tools: Crackmapexec, Evil-Winrm, Impacket-Library, Mimikatz,


lagazne, Kerbrute.
CONTACT US

Phone No.
+91 9599 387 41 | +91 1145 1031 30

WhatsApp
https://wa.me/message/HIOPPNENLOX6F1

EMAIL ADDRESS
info@ignitetechnologies.in

WEBSITE
www.ignitetechnologies.in

BLOG
www.hackingarticles.in

LINKEDIN
https://www.linkedin.com/company/hackingarticles/

TWITTER
https://twitter.com/hackinarticles

GITHUB
https://github.com/ignitetechnologies

You might also like