Courses by Core Security

  • Course: Core Impact Certified Professional (CICP)
  • Length: 2 Days
SCHEDULE

Day 1:

Introduction
- Vulnerability Assessment vs. Penetration Testing
- Advantages & Summary
- Critical Features
- How does IMPACT Pro fit in?

Getting Started
- YOUR Setup
- Installation Requirements
- Licensing & Activation
- Updating
- Tools
- Options Scheduling

Working with Workspaces
- Working with work…spaces
- Creating a New Workspace

The Interface, RPTs, and Workspaces…OH MY!
- Workspace View
- Rapid Penetration Test Tabs
- Modules View
- Executed Modules View

Identifying the Targets
- OS Detection
- Individual Modules

- Lab: Identifying the Targets

Agents
- Underlying Technology
- Types
- OS Agents – Deployment Options
- Oninstalling Agents
- Connection Methods

Exploitation
- Exploit Selection Basis
- Don’t forget about DoS!

Lab: Installing Agents….Manually

The Metasploit Integration
- No tool is an island…
- Setup & Import
- Attack Options

Lab: Exploitation

Pivoting
- Helpful Hints
- Agent Configuration

Lab: Pivoting

Privilege Escalation
- Starting Off
- Configuration and Execution
- ROOT!

Cleaning Up
- Clean Up RPT
- A Deeper Clean

Network Device Testing
- Discovery
- Exploitation Methods
- Success!
- IOS Agent – Privilege Escalation
- Interaction with IOS Agents


Remote Interface (Power Pivoting)
- Introduction
- The Setup
- Configuration

Integration with Vulnerability Scanners
- Overview
- Support Network Scanners
- What about Web Application Scanners?
- Using Imported Data

Reports
- Various Types for various audiences
- Generating Reports
- Report Output

- Hacker Challenge

Day 2:

Client-Side Information Gathering
- Usage Tips
- Would your users click this link?
- What does IMPACT Pro need?
- Discovery Options
- Generating Email Addresses – LinkedIn Users

- Lab: Attacking an End-User

Mobile Device Testing
- Introduction
- Client-Side RPT
- Testing Options
- Attack Options – Web Browser or Trojan
- Attack Delivery
- Mobile Agent Options

Web Application Testing
- OSVDB Statistics
- OWASP Top 10

Lab: WebApps Scanning

Lab: Web Exploitation & Beyond

Additional Topics
- Mmmacros!
- Miscellaneous Folder
- Other import/export Methods

Reference
- System Requirements
- Entity Icons
- Book Recommendations
- Customer Service & Support


Reporting – Customizing the Output

 

 

 

Register Now