Null offensive hacking hands-on training.
Proposed sessions for this event:
- Infrastructure Pentesting Series - Part III by Vijay Kumar
Welcome to the third session in the series of Infrastructure Pentest. By using intelligence gathering ( Recon ) we have completed the normal scanning and banner grabbing of the targeted organization. Yay!!. Now, it’s time for some metasploit-fu and nmap-fu. We will move port by port and check what metasploit framework and nmap nse has to offer.
Below are the ports/ services we will cover:
FTP, SSH, Telnet, SMTP, Submission, DNS, Finger, HTTP, Kerberos,
NetBios, POP3, RPCInfo, Ident, SNMP, Check Point FireWall-1 Topology, LDAP, SMB, rexec, rlogin, RSH, AFP - Apple Filing Protocol, Microsoft Windows RPC Services, Microsoft RPC Services over HTTP, HTTPS, RTSP, Rsync , Java RMI, MS-SQL,Oracle, NFS, MySQL, ISCSI, Postgresql, VNC, X11, PJL, Apache Cassandra, Network Data Management Protocol (ndmp), Memcache, MongoDB, EthernetIP-TCP-UDP, UDP BACNet
Please bring your own spike/extension chord & internet connection.
Laptop with either VMWare/Virtualbox and kali linux.
Note: Filling up the google form link provided below is important to get
yourself shortlisted for the workshop & only shortlisted will get mail for
|Date||Saturday May 27 2017|
|Event Type||Invite Only|
|Start Time||10:00 AM|
|End Time||04:00 PM|