Hands-On Penetration Testing
“If you know the enemy and know yourself, you
need not fear the result of hundred battles” – Sun Tzu, Art of
Course Title: Hands-On
Penetration Testing (Improved version of Ethical Hacking Course)
Who can attend: Software engineers, System
administrators, Programmers, and anyone interested in the field of
Security and Hacking.
- Intermediate Programming skills
- Basic knowledge of network concepts:
1. IP Addressing
2. Standard protocols: HTTP, DNS, etc.
- Basic Dos/Linux commands: ls, cd, cp, mkdir, etc.
Duration: 4 days (Weekend)
Dates*: January 16-January 19, 2019
Location: Information and Computer Science
Department, KFUPM, Al-Dhahran, Saudi Arabia.
Instructor: Dr. Sami Zhioua
Course Fees: 5000SAR
(Special fees available for KFUPM students and staff)
Registration: Department of Continuing
Education, Building 54, Room 107.
For Course details:
* If you are a group and
you are interested to take the course in a different date, you can
contact the instructor for arrangement.
What to bring ?
The short course is delivered in a fully equipped ICS
Cybersecurity Lab. But optionally, if you want to work on your personal laptop, we highly recommend
that you bring a Laptop with the following minimum requirements:
- i7 processor
- More than 8GB of RAM
- 150GB of free hard-disk (internal or external)
- VirtualBox 6.0 installed.
In addition, if you want to practice with Wireless Security, you
- Alfa AWUS036H (https://saudi.souq.com/sa-en/alfa-awus036h/s/?as=1)
What you will get ?
- Course material (Hard copy of course slides)
- Lab Manual: detailed instructions for the Lab steps
- More than 100GB of Virtual Machines well configured for learning and
practicing with penetration testing.
- Offical Penetration Testing Certificate from KFUPM.
Reasons to take the course
- Understand the Cybersecurity field from an offensive
point of view (How hackers proceed).
- Unlike online courses which take a couple of
weeks/months, this course is intensive (4 days) and very practical.
- Penetration testing certifications are very demanded in
the industry and the job market.
The explosive growth of the Internet has brought many good things: electronic
commerce, easy access to vast stores of reference material, collaborative
computing, e-mail, and new avenues for advertising and information distribution,
to name a few. As with most technological advances, there is also a dark side:
Governments, companies, and private citizens around the world are anxious to be
a part of this revolution, but they are afraid that some hacker will break into
their Web server and replace their logo with adult images, read their e-mail,
steal their credit card number from an on-line shopping site, or implant
software that will secretly transmit their organization’s secrets to the open
In their search for a way to approach the problem, organizations came to realize
that one of the best ways to evaluate the intruder threat to their interests
would be to have independent computer security professionals attempt to break
into their computer systems. This scheme is similar to having independent
auditors come into an organization to verify its bookkeeping records. In the
case of computer security, these “tiger teams” or “ethical hackers” would
employ the same tools and techniques as the intruders, but they would neither
damage the target systems nor steal information. Instead, they would evaluate
the target systems’ security and report back to the owners with the
vulnerabilities they found and instructions for how to remedy them.
If a hacker wants to get inside your system, he/she will,
and there is nothing you can do about it
The only thing you can do is make it harder for him to get in.
Interesting facts about Hacking and Security:
- The majority of computer systems aren’t managed properly
- Most network and security administrators simply can’t keep up with the
deluge of new vulnerabilities and attack methods
- Information systems grow more complex every year
- The law of averages works against security
- With the increased number of hackers and their expanding knowledge and
the growing complexity of IT systems, eventually, all computer systems and
applications will be hacked or compromised in some way.
- Hacking preys on weak security practices and undisclosed
- Firewalls, encryption, and passwords can create a false feeling of
- These security mechanisms often focus on high-level vulnerabilities
without affecting how the bad guys work.
- Attacking your own systems to discover vulnerabilities helps make them
- Ethical hacking is the only proven method of greatly hardening your
systems from attacks.
- If you don’t identify weaknesses, it’s only a matter of time before the
vulnerabilities are exploited.
- It’s one thing to know generally that your systems are under fire from
hackers around the world and malicious users around the office;
- It’s another to understand and to see specific attacks against your
systems that are possible.
- As hackers expand their knowledge, so should you.
- You must think like them and work like them to protect your systems from
- As an ethical hacker, you must know the activities that hackers carry
out and how to stop their efforts.
- An ethical hacker possesses the skills, mindset, and tools of hacker but
is also trustworthy.
- Ethical hacking involves the same tools, tricks, and techniques that
hackers use, but with one major difference: Ethical hacking is performed
with the victim’s permission.
- The intent of ethical hacking is to discover vulnerabilities from a
malicious attacker’s viewpoint to better secure systems.
1. Introduction to Network Security
Open Source Intelligence (OSINT)
Web Application Scanning
2. Hacking and Intrusion
Understanding Vulnerabilities (B.O)
Transferring and executing files in the victim
3. Advanced Penetration Techniques
Dictionary Based Password Cracking
Rainbow Table Password Cracking
Resisting password cracking attacks
4. Network Attacks and Security
Network Sniffing to observe traffic
ARP Poisoning attacks
Network Configuration against Sniffing attacks
5. Web Application Hacking
Burp Suite Tutorial
SQL Injection Attacks
XSS Scripting Attacks
Defending against web hacking
6. Malware and Rootkits
Different Types of malwares
Malware binders and packers
Bypassing Antivirus Tools
Social Engineering Toolkits
7. Wireless and Physical Penetration
Sniffing Wireless Traffic (Monitor Mode)
Using Alfa AWUS036H Wifi Adapter
Creating and Detecting Rogue AP
Wireless Denial Of Service (DoS) Attacks
A Seminar on Hacking by Dr. Sami Zhioua
Sami Zhioua, December 2018