100% found this document useful (1 vote)
416 views

WsCube Tech - Penetration Testing (WS-PEN) Course

The document describes a 12-session penetration testing course offered by WsCube Tech. The course covers topics such as information gathering, network scanning, website vulnerability assessment, system hacking, Android application penetration testing, and using Python and shell scripting for penetration testing. It provides learning objectives, topics, and tools covered for each session. The course aims to teach students essential penetration testing concepts and skills.

Uploaded by

Research fact
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
416 views

WsCube Tech - Penetration Testing (WS-PEN) Course

The document describes a 12-session penetration testing course offered by WsCube Tech. The course covers topics such as information gathering, network scanning, website vulnerability assessment, system hacking, Android application penetration testing, and using Python and shell scripting for penetration testing. It provides learning objectives, topics, and tools covered for each session. The course aims to teach students essential penetration testing concepts and skills.

Uploaded by

Research fact
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Address: WsCube Tech, Laxmi Tower, Bhaskar Circle, Jodhpur, Rajasthan, India

Contact Us at: +919269698122, +919024244886. Mail us at: [email protected]

Penetration Testing (WS-PEN) Course

Session - 1 (Introduction to Pen Test)


Session – 2(Information Gathering)
Session – 3(Network Scanning)
Session – 4(Pen Testing Website)
Session – 5(Hacking System)
Session – 6(Introduction to Pen Test Android Application)
Session – 7(Setting up Lab)
Session – 8(Pen Testing Android)
Session – 9(Bug Reporting)
Session – 10(Python Programming With Pen Test)

Session – 11(Shell Scripting with Pen Test)

Session – 12(Nmap Bible)

We provide training for Ethical Hacking Web Development, C, C++, Java, Core Java, Digital
Marketing, UX, UI, AWS, Python, ML, Laravel, React JS, Angular JS and Node JS.
Address: WsCube Tech, Laxmi Tower, Bhaskar Circle, Jodhpur, Rajasthan, India

Contact Us at: +919269698122, +919024244886. Mail us at: [email protected]

Session - 1 Introduction to Penetration Testing

Learning Objective: In this module, you will learn about the essential building blocks and basic
concepts around Penetration Testing such as Definition, Need, Phases, Methodology and so
on.

What is Penetration testing?


Need of penetration testing
Phases of Penetration Testing
Penetration Testing Execution Standard

Session – 2 Information Gathering

Learning Objective: In this module, you will learn about the essential building blocks and basic
concepts around Information Gathering such as Confidentiality, Integrity, Availability and so
on.

Introduction to Information Gathering


Types of Information Gathering
What we are looking for?
Footprinting through Burpsuite Pro

Session – 3 Network Scanning

Learning Objective: In this module, you will glance over various aspects related to computer
networks and in-parallel delve into understanding the weaknesses & concepts around securing
the networks

Introduction to Network Scanning


Types of Scans in Network Scanning
Rules for Scanning a Network
What we are looking for?
Network Scanning
Advance Scanning Commands and Scripts

We provide training for Ethical Hacking Web Development, C, C++, Java, Core Java, Digital
Marketing, UX, UI, AWS, Python, ML, Laravel, React JS, Angular JS and Node JS.
Address: WsCube Tech, Laxmi Tower, Bhaskar Circle, Jodhpur, Rajasthan, India

Contact Us at: +919269698122, +919024244886. Mail us at: [email protected]

Session – 4 Pen Testing Website

Learning Objective: In this module you will learn how to analyze a system for various
vulnerabilities such as SQLi, XSS, LFI/RFI, CSRF and so on.

Introduction to Vulnerability Assessment


How to find the Correct Scope
How to find Vulnerable Parameters
Introduction to Parameter Temptation
Testing Advance Parameter Temptation
Introduction to SQL injection
Types of SQL Injections.
SQLi Methodology
Testing for SQLi Vulnerability
Advance SQLi Testing (SQLMAP)
What is XSS?
Types of XSS
XSS methodology
Hands on XSS
Inovative Countermeasures
Introduction of LFI/RFI
Advance Testing for LFI/RFI
Introduction of CSRF
Advance Testing CSRF Attack
Introduction to Host-Header-Injection
Testing HHi
Introduction to CORS
Testing for CORS
Introduction to Session Hijacking
Testing for Session Hijacking vulnerability
Introduction to Dos
Types of Dos attack
Testing for DoS/DDoS Vulnerability
Testing for more Cool Attacks…..

We provide training for Ethical Hacking Web Development, C, C++, Java, Core Java, Digital
Marketing, UX, UI, AWS, Python, ML, Laravel, React JS, Angular JS and Node JS.
Address: WsCube Tech, Laxmi Tower, Bhaskar Circle, Jodhpur, Rajasthan, India

Contact Us at: +919269698122, +919024244886. Mail us at: [email protected]

Session – 5 Hacking System

Learning Objective: In this module, you will learn about the essential building blocks and
advance Techniques around System Hacking such as Scanning, Exploiting, Gaining Access, Ports
and so on.

Introduction to Exploiting
Where to Exploit
How to exploit using Metasploit
Advance Exploiting Techniques
Binding Application

Session – 6 introduction to Pen Test Android Application

Learning Objective: In this module, you will glance over various aspects related to Penetration
Testing on Android application.

What is Android?
What is Android Application?
Intro to Android Manifest.xml
Major components of an apk
Methodology of Pen Testing apk
Dalvink VM Vs ART Run time

Session – 7 Setting up Lab

Learning Objective: In this module, you will glance over various aspects related to Penetration
Testing on Android application.

Setting up Lab
Installing bytecode-viewer
Installing MobSF
APK Server and adb setup

We provide training for Ethical Hacking Web Development, C, C++, Java, Core Java, Digital
Marketing, UX, UI, AWS, Python, ML, Laravel, React JS, Angular JS and Node JS.
Address: WsCube Tech, Laxmi Tower, Bhaskar Circle, Jodhpur, Rajasthan, India

Contact Us at: +919269698122, +919024244886. Mail us at: [email protected]

Session – 8 Pen Testing Android

Learning Objective: In this module, you will glance over various aspects related to Penetration
Testing on Android application.

Reverse Engineering
Information Gathering
Pen Testing using MobSF
Insecure Password Storage
Hidden Buttons
Developers bug
Insecure Login
Debug Mode Enabled
Backup Mode Enabled
Insecure Logging Advance

Session – 9 Bug Reporting

Learning Objective: In this module you will learn how to generate a perfect bug report.

What do you mean by Reporting?


Need for Reporting a Bug
Advantages or Reporting a Bug
How to Scoring your Bug
How to Create a Good Report

We provide training for Ethical Hacking Web Development, C, C++, Java, Core Java, Digital
Marketing, UX, UI, AWS, Python, ML, Laravel, React JS, Angular JS and Node JS.
Address: WsCube Tech, Laxmi Tower, Bhaskar Circle, Jodhpur, Rajasthan, India

Contact Us at: +919269698122, +919024244886. Mail us at: [email protected]

Session – 10 Python Programming With Pen Test

Learning Objective: In this module, you will learn about the essential building blocks and basic
concepts around Python Programming for ease of Pen testing.

Introduction to Python Programming


Use of Python
Setting up Lab
Learning Basic Python Programming
Creating python scripts for ease of pen testing
Making Cool Scripts.

Session – 11 Shell Scripting with Pen Test

Learning Objective: In this module, you will learn about the essential building blocks and basic
concepts around Shell Programming for ease of Pen testing.

Introduction to Shell Scripting


Use of Shell Scripting
Setting up Lab
Learning Basic Shell Scripting
Creating Shell Scripts for Ease of Penetration Testing
Making Cool Scripts
Session – 12 Nmap Bible

Learning Objective: In this module, you will glance over various aspects related to computer
networks and in-parallel delve into understanding the weaknesses & concepts around securing
the networks

Installing Namp and Zenmap


Installing Metasploitable2 & Windows xp (The Victim)
Checking Host Status and Buffer Size
Basic nmap Scan (-sS -st -A -p -v)
Nmap Scan (-sV -O -oX -sC --Script.......)
XmasScan
Zombie Scan
ICMPScan
IDS bypass Scans

We provide training for Ethical Hacking Web Development, C, C++, Java, Core Java, Digital
Marketing, UX, UI, AWS, Python, ML, Laravel, React JS, Angular JS and Node JS.

You might also like