eLearnSecurity

PTP v5

Penetration Testing Professional

Curious about this course?

Enroll now and get access to all of our material and labs!

Plans and Pricing

INDIVIDUALS

View enrollment fees for individual students.

CORPORATE

Purchase eLearnSecurity courses for your company.

Extremely Hands-on

Practice Penetration Testing against a number of real world networks. PTP includes the most sophisticated virtual lab in Pentesting: Hera Lab.

Discover Labs

Become Certified

Obtaining the eCPPTv2 certification proves your practical skills, with the only 100% practical certification in Penetration Testing.

Discover eCPPTv2

Course at a glance

  • Based on techniques professional pentesters use
  • Covers everything a modern Pentester needs to know
  • Network Pentesting,Web Application Pentesting,Wifi Pentesting,System Security Section
  • Architecture fundamentals, Buffer overflow and Shellcoding
  • Covers both Windows and Linux exploitation
  • Post-Exploitation and Pillaging methodology
  • Includes Ruby & PowerShell for Pentesters sections
  • Learn how to create your own Metasploit modules
  • Learn how to leverage the PowerShell Empire toolkit
  • Includes a professional guide on Pentest Reporting
  • Extremely Hands-on with dozens of labs and exercises
  • Obtaining the eCPPTv2 certification qualifies you for 40 CPE

Course material

  • More than 17 hours of HQ video training material
  • 6500+ slides
  • 30 labs in Hera Lab

Course delivery

  • Self-paced, HTML5, PDF, MP4
  • Off-line access available
  • Access from PC, Tablet and Smartphone

Test drive this course for free

Syllabus

Section: System Security

  • Module 1 : Architecture Fundamentals

    In this module, you will learn the fundamental concepts needed to help you improve your skills in topics such as fuzzing, exploit development, buffer overflows, debugging, reverse engineering and malware analysis. Sample C++ and Assembly language source codes are provided in order to get the student familiar with these languages.

  • Module 2 : Assemblers, Debuggers and Tools Arsenal

    The previous module showed you that Assembly is a very low-level programming language consisting of mnemonic code, also known as opcode (operation code). Although it is a low-level language, it still needs to be converted into machine code in order for the machine to execute. In this module you will see how this happens and what tools are required.

  • Module 3 : Buffer Overflow

    Finding and exploiting buffer overflows in real world applications is what you will learn during this incredibly hands-on module. A hard topic made easy through examples explained step by step starting from the very basics of stack manipulation. Armed with assemblers, compilers and debuggers, the students will learn how to hijack the execution of an application. At the end of the module, the student is exposed to the most modern techniques used to prevent Buffer overflows and the main methods to bypass them.

  • Module 4 : Shellcoding

    The art of Shellcoding is made available to anyone through easy to understand samples and real world complex scenarios. A small theoretical overview will lead into practical examples, where you will actually create your own shellcode through the use of compilers and assemblers. Different techniques are shown in order to let you create your own shellcode. Three source code examples are explained line by line.

  • Module 5 : Cryptography and Password Cracking

    Almost all penetration test engagements require the understanding of cryptographic topics. This module will ensure that you are current with the most common cryptographic technologies, algorithms and tools. You will also learn how to perform advanced password cracking using the best tools available. A thorough review of the most modern tools used to steal and crack Windows password hashes is provided.

  • Module 6 : Malware

    Here you are provided with a thorough and detailed introduction to the classifications of malware types, explaining the most advanced and obscure techniques used by modern malware. The module is complemented by three malware source codes being dissected and explained: a Keylogger, a Trojan and a Virus.

Section: Network Security

  • Module 1 : Information Gathering

    The Information Gathering module is the most important phase of the overall engagement. A Penetration tester will use the information collected during this phase to map the attack surface and increase his chances to breach the organization in the same way criminals do. eLearnSecurity proposes an extremely thorough investigation methodology that takes into account the Business and the Infrastructure of the client. Students will learn how to get access to valuable, sensitive and sometimes secret documents by means of free services, databases and specialized search engines. Infrastructure Information gathering will deal with the enumeration of DNS, Domains, netblocks and other web assets belonging to the organization.

  • Module 2 : Scanning

    As one of the most important steps in the penetration test of a network, this module will first teach you the theory behind port scanning and service reconnaissance. If you are not a network expert, the first chapters of this module will introduce you to the basics of TCP and other network protocols. We will then show you how to use the best tools to detect live hosts, open ports and services running on them. Through Nmap and Hping2, you will learn how to find zombies to mount completely stealth port scans against a target. Passive and Active OS fingerprinting techniques will also be covered in depth.

  • Module 3 : Enumeration

    The scope of this module is to provide you with the techniques professional penetration testers employ to enumerate resources on target. You will be able to explore, enumerate and map the remote network and its available services through a number of different Windows and Unix tools. NetBIOS is the subject of the first part of this module: real world examples will be explained to show most important techniques and tools to enumerate remote Windows shares and printers. You will also learn how to test for NetBIOS Null Sessions that still affect old Windows versions. SNMP basics will be explained. The student will then be introduced to attacks against the protocols through a number of common tools.

  • Module 4 : Sniffing & MITM

    Studying ARP, how it works and how it can be manipulated to mount sophisticated attacks is made extremely easy to understand. Sniffing is a technique that you will be able to fully grasp in its most practical aspects. We will make sure you have enough basics of network theory before we cover actual attack scenarios using the best tools available. LLMNR and NBT-NS spoofing/poisoning is also covered, including advanced scenarios leveraging the Responder toolkit. Man in the middle attacks are one of the most used penetration testing techniques today; you will be able to mount man in the middle attacks within local networks and over the Internet.

  • Module 5 : Vulnerability Assessment & Exploitation

    This module will teach the student how to master Nessus in order to perform thorough and targeted Vulnerability scans. Windows authentication protocols are dissected to demonstrate weaknesses and related attacks from Metasploit. The student is then immersed in common exploitation techniques used by today’s Penetration testers, to exploit client side and remote vulnerabilities in Workstations and Servers. The latest Windows remote code execution vulnerabilities are covered and combined with numerous other attacking techniques. Lastly, creating custom wordlists, is another skill the student will acquire by studying this module. It should be noted that this module is video and lab intensive.

  • Module 6 : Post Exploitation

    eLearnSecurity's experienced instructors have come up with a proven methodology to conduct a thorough exploitation of remote internal networks through advanced post exploitation techniques. Once you are comfortable with most recent exploitation techniques, you will be exposed to the cyclic steps of a successful post exploitation phase. This is the phase where criminals ensure stable high privileged access to the remote network in order to steal and ex-filtrate documents and credentials from the organization. Penetration testers must possess the same skill-set and tools in order to test not only the perimeter security but also any kind of internal weakness that affects the organization security. Privilege escalation through insecurely configured services, DLL hijacking and DNS tunneling are only a small percentage of what students will learn in this module.

  • Module 7 : Anonymity

    Penetration testers rarely need to cover their tracks. However there are times when testing the efficiency of the target organization incident response team is within the scope of a Penetration tester’s engagement. This module will teach techniques to perform your tests while covering your tracks.

  • Module 8 : Social Engineering

    The social engineering module will guide you through the most modern social engineering attack techniques. Real world attacks will be illustrated by exploiting the potential of social networks such as Facebook, Spokeo or Twitter. Almost one hour of video lessons will teach you everything you need to know to master the most important tool in the field: Social Engineering Toolkit.

Section: PowerShell for Pentesters

  • Module 1 : Introduction

    The PowerShell for Pentesters Introduction module offers an introduction into the Why and What of PowerShell. Introducing some of the benefits to using PowerShell for penetration testing engagements, and what PowerShell is at a high-level.

  • Module 2 : PowerShell Fundamentals

    PowerShell Fundamentals takes the student through the very essentials of PowerShell. From utilizing the Command Line Interface, to various useful commands and components as they relate to PowerShell and its use in Penetration Testing. The student will have a good understanding of Module usage, Cmdlets, Objects, Scripting, Loop-Statements and introduces some common PowerShell frameworks and other techniques for use with Penetration Testing.

  • Module 3 : Offensive PowerShell

    With the Offensive PowerShell module, students will dive deeper into specific PowerShell tools, techniques and frameworks. From downloading and execution of payloads and scripts, to Obfuscation, Information Gathering, and Post-Exploitation. This module will also provide the student with a greater understanding of the “Living Off The Land” concept as it relates to utilizing PowerShell for offensive purposes and introduces several powershell pentesting frameworks and tools including Nishang, PowerSploit, and Empire.

Section: Linux Exploitation

  • Module 1 : Introduction

    The Linux Exploitation introductory module introduces Linux as a platform-of-choice for many of today’s internet-connected devices, covers some history and various common distributions.

  • Module 2 : Information Gathering

    This module takes the student through the methods and tools used during the Information Gathering process for Linux-based systems, from remote information gathering, to gathering information locally on compromised systems. Including enumerating services such as SMTP, SMB, NFS and more, using both automated tools, and manual bash scripting-based methods.

  • Module 3 : Exploitation Over the Network

    The Exploitation Over the Network section is an in-depth dive into exploiting some of the most common and some not-so-common vulnerabilities found to affect Linux-based systems. The student will learn the concept of password spray attacks, to exploiting Java, Samba, Shellshock and a host of other vulnerabilities from a remote perspective. This module will enable the student to identify exploitable vulnerabilities and misconfigurations commonly found on Linux systems.

  • Module 4 : Post Exploitation

    The post-exploitation module for Linux Exploitation will navigate the student through the various stages of post-exploitation from Privilege Escalation, to Lateral Movement, Data Exfiltration and Maintaining Access. The student will learn how to exploit misconfigurations, SUID executables, crack passwords, the basics of Kernel Exploits, and will also learn some lesser known techniques for obtaining root access, such as SSH hijacking and Shared Object Library loading, to several newer and lesser-known techniques that can be used to maintain persistence through custom services and utilities already built-in to the operating system.

Section: Web Application Security

  • Module 1 : Introduction

    This module will introduce you to the web application security field and its basic terminology. If you are new to this field, you will gather all the skills you need to move to more advanced modules. If you are already an advanced web application security tester, you will get introduced to the methodology and tools followed throughout the course.

  • Module 2 : Information Gathering

    Web application information gathering is a long and complex process. It takes insight and perseverance. You will learn the best methodologies to collect and store information about your target web assets. This information will be used at later steps in the exploitation process. At the end of this module, you will have so much information on your target that exploiting it will be easy and fun.

  • Module 3 : Cross site scripting

    The most widespread web application vulnerability will be dissected and studied thoroughly. At first, you will be provided with a theoretical explanation. This understanding will help you in the exploitation and remediation process. Later, you will master all the techniques to find XSS vulnerabilities through black box testing and within PHP code. Real world exploitation examples will conclude the module; you will finally steal session cookies, modify website DOM and perform advanced phishing attacks. This is a hands-on intensive module.

  • Module 4 : SQL Injection

    This module contains the most advanced techniques to find and exploit SQL Injections, from the explanation of the most basic SQL injection to the most advanced. Advanced methods will be taught with real world examples and the best tools will be demonstrated on real targets. You will not be able to just dump remote databases but also get root on the remote machine through advanced SQL Injection techniques. Tools will be covered in depth and a taxonomy will help the student to pick the right tool according to the environment and scenario he will face in real engagements. This is a video and hands-on intensive module.

  • Module 5 : Other Common Web Attacks

    Sophisticated attacks against web applications are the subject of this module. Session Fixation and CSRF are often underestimated and overlooked vulnerabilities. They will be covered in depth. A working exploit will be created step by step to demonstrate a CSRF vulnerability found in a famous CMS.

Section: WiFi Security

  • Module 1 : Prerequisites

    In the first module of the Wi-Fi section, we will see which are the hardware/software prerequisites of the course.

  • Module 2 : Environment setup

    In this module, the student will learn how to properly configure the test environment in order to obtain the best outcome from the successive modules.

  • Module 3 : Wireless Standards and Networks

    In the following module, the student will learn the basic concepts at the base of the Wi-Fi infrastructures. We will see which types of Wi-Fi configurations exist, how they work, and which are the security features and mechanisms implemented. We will also present an overview of the most important flaws that affect different types of Wireless infrastructures and protocols.

  • Module 4 : Discover Wi-Fi Networks

    The first step when we run a penetration tests against Wi-Fi networks is to discover and identify our target. In this module, we will see how to do this through a series of tools available for different platforms.

  • Module 5 : Traffic Analysis

    After the target network has been identified, the next step is to configure our tools in order to sniff and intercept the traffic. This is a very important step for all the attacks that come here after.

  • Module 6 : Attacking Wi-Fi Networks

    This module focuses on the attacks that can be executed on Wi-Fi networks. The student will learn how to attack and access remote Wi-Fi networks, obtain keys, password and much more, according to their configuration and security mechanism. We will first start exploring the attacks against WEP and then focus our tests on more secure networks: WPA, WPA2 and WPS.

  • Module 7 : Wi-Fi as an attack vector

    In the last module, of the Wi-Fi section, the student will learn how to use Wi-Fi as an attack vector. This means that we will not attack Wi-Fi networks, instead we will use Wi-Fi in order to create fake networks, obtain credentials, run MitM attacks and much more. The effective evil-twin attack will be demonstrated in detail, in addition to describing how WPA2-Enterprise can be attacked.

Section: Ruby for Pentesters and Metasploit

  • Module 1 : Ruby Basic: Installation and Fundamentals

    In the first module of the Ruby section, you will see how to install and configure the Ruby environment. Once the environment is configured, you will learn the basic concepts of Ruby, such as running and writing scripts, using the interpreter, installing gems and much more. You will also learn the basic concepts of Ruby such as data types, variables declarations and more.

  • Module 2 : Ruby Basic: Control structures

    One of the most important program structures that a programmer has to master is the ‘flow control structure.’ In this module, the student will learn how to write and define different types of Ruby control structures. This will allow the student to create scripts and programs that are not limited to a linear sequence of statements.

  • Module 3 : Ruby Basic: Methods, Variables and Scope

    Every program must be clean and have reusable structures. In this module, the student will learn how to define and use Ruby methods, blocks, aliases and more. This is useful for creating very powerful tools and scripts. With the introduction of methods and blocks, a very important topic needs to be covered: the scope.

  • Module 4 : Ruby Advanced: Classes, Modules and Exceptions

    Ruby is an Object Oriented Programming language. With that said, an OO program involves classes and objects. In this module, we will start covering more advanced topics and we will see how to define and use classes, functions, modules, mixin, namespaces and much more. Along with these topics, we will also see how to handle exceptions; exceptions are a very useful topic that needs to be mastered in order to take control of the program behavior.

  • Module 5 : Ruby Advanced: Pentester prerequisites

    Ruby is a very powerful programming language and thanks to its many features, it can be used for many different purposes. From this module on, we will focus on how to use Ruby for penetration testing purposes. One of the first topics we will cover is ‘Regular Expression.’ Regex is widely used in the security field; it is used to find and locate important information stored in files, web pages, network communication and so on. A good knowledge of how to use and define regex is a ‘must’ for a penetration tester! During the study of this module, the student will also learn how to use date and time classes as well as manage and interact with files and directories: read, delete, create and so on.

  • Module 6 : Ruby for Pentesters: Input / Output

    In this module, the student will learn how to use different input and output mechanisms and techniques in order to find (read) or store (write) information to and from files. We will see several examples and scripts that can be used in conjunction with other tools (i.e. nmap) in order to gather, filter and store important information.

  • Module 7 : Ruby for Pentesters: Network and OS interaction

    Another very important topic that a penetration tester should master is ‘network communication.’ In this module, the student will learn how to use the power of Ruby in order to create, forge, intercept network communications. Thanks to many useful examples and scripts, the student will learn how to create raw sockets, forge packets, create TCP/UDP scanners and much more. We will also see how to interact with local and remote Operating Systems. This, in conjunction with the network communication skills, may be useful to create powerful tools (i.e. backdoors that are able to retrieve information from remote systems, as well as send and run specific commands).

  • Module 8 : Ruby for Pentesters: The Web

    In the previous module, the student will study network communications and local interactions with the OS. Now it is time to focus on Web Applications. We will see how to create and intercept HTTP and HTTPS requests and responses, as well as how to send/read GET and POST parameters and much more. Along with these topics, the student will be also presented with some useful scripts and use cases useful to run attacks against web application or identify vulnerabilities such as XSS.

  • Module 9 : Ruby for Pentesters: Exploitation with Ruby

    During the study of previous modules, the student should have acquired many Ruby programming skills. It is time to take advantage of these skills and use Ruby in order to write and exploit vulnerable services and software. In this module, we will present a vulnerable application that the student can use to learn how to write a full working exploit.

  • Module 10 : Ruby for Pentesters: Metasploit

    Now that the student has mastered Ruby and its features, it is time to start working with one of the most powerful Ruby tools: Metasploit. In this module, the student will study the Metasploit architecture and the framework, and will learn how to create, add or edit custom Metasploit modules. Thanks to our virtual labs, the student will also have the chance to practice against real vulnerable machines.

Download PDF Syllabus

Pre-requisites

  • Basic understanding of networking: TCP/IP, Routing, Forwarding.
  • Reading and understanding C, ASM, Python, PHP code will help although not mandatory.
  • No development skills required.
  • Basic understanding of HTTP protocol, Cookies, Sessions
  • Understanding of IT Security matters and basics of Penetration Testing
  • A wireless NIC with injection capabilities (Alfa AWUS036h recommended)
  • A spare WiFi Access point
  • All the above recommended skills are provided within the PTS course

This training course is for...

  • Penetration Testers
  • IT Security Professionals
  • Network security engineers
  • IT Personnel
  • Developers
  • CERT’s

Labs

Penetration Testing Professional (PTP) is the most practical training course on the Penetration testing. Being integrated with Hera Lab, the most sophisticated virtual lab on IT Security, it offers an unmatched practical learning experience. Hera is the only virtual lab that provides fully isolated per-student access to each of the real world network scenarios available on the platform. Students can access Hera Lab from anywhere through VPN.

Lab IDDescriptionCategory
Lab 1 System Security Educational
Lab 2 Information Gathering Educational
Lab 3 Scanning Educational
Lab 4 VA and Exploitation Educational
Lab 5 Post-Exploitation Educational
Lab 6 Blind Penetration Test Educational
Lab 7 Nessus Educational
Lab 8 Cain and Abel Educational
Lab 9 NetBIOS Hacking Educational
Lab 10 Poisoning and Sniffing Educational
Lab 11 NBT-NS Poisoning and Exploitation with Responder Educational
Lab 12 Client-Side Exploitation Educational
Lab 13 DNS and SMB Relay Attack Educational
Lab 14 SNMP Analysis Educational
Lab 15 Privilege Escalation Educational
Lab 16 Privilege Escalation Via Services Educational
Lab 17 Finding and Exploiting DLL Hijacking Vulnerabilities Educational
Lab 18 Bypassing AV Educational
Lab 19 Leveraging PowerShell During Exploitation Educational
Lab 20 PowerShell for Post-exploitation and Lateral Movement Educational
Lab 21 Linux Exploitation - Remote Enumeration Educational
Lab 22 Linux Exploitation - Local Enumeration Educational
Lab 23 Linux Exploitation - Remote Exploitation and Post-Exploitation Educational
Lab 24 Linux Exploitation - Lateral Movement Educational
Lab 25 Ruby Educational
Lab 26 Exploitation with Ruby Educational
Lab 27 From XSS to Domain Admin Educational
Lab 28 ICMP Redirect Attack Educational
Lab 29 WebApp Labs - Introduction Educational
Lab 30 WebApp Labs - Web Application Attacks Educational

Certification

Get the eCPPTv2 Certification

eLearnSecurity's eCPPTv2 (Certified Professional Penetration Tester) certification is the most practical and professionally oriented certification you can obtain in penetration testing.

Instead of putting you through a series of multiple-choice questions, you are expected to perform an actual penetration test on a corporate network. This penetration test is modeled after a real-world scenario.

Learn more

Instructor

  • Fabrizio Siciliano
    Fabrizio Siciliano

    With nearly 20 years of experience in the Information Security industry in both Offensive and Defensive roles within the private and public sectors, and with the last seven years primarily focused on the offensive side of the house, Fabrizio brings his real-world experience to the eLearnSecurity body-of-knowledge to provide the latest in information security research and techniques.

Previous Authors

Previous Authors include Armando Romeo, Brett D. Arion, Stefano Angaran, Andrea Tarquini, Francesco Stillavato

Enroll now and get access to all of our material and labs!

Reviews

The mix of Video Tutorials, exercises and support from fellow students on the forum was fantastic. Anyone who wants to specialize in Web Penetration Testing, this course is a must to get you started. Thanks for your efforts in making this happen

Denis Hancock
Manager Consulting Pty Ltd

Having been in the security field for over 5 years I assumed this would be a quick and easy certification. After getting into the training course I was pleased to find that I was learning new things and that the course was certainly more challenging than I had anticipated. I found that it filled in several knowledge gaps when it comes to pentesting, and I would recommend this course to both veterans and newcomers to the security field.

Steven Collins

eLearnSecurity's training really dives deep into the underlying concepts beneath pentesting tools.

Timothy E. Everson
Novell inc

Go to top of page