Course Overview
Capture the Flag is an information security competition that is an amalgamation of various challenges that apply concepts like Reverse engineering, Web Applications, Binary, Network, Cryptography, Forensics, etc. Each challenge holds a certain number of points based on its difficulty level. The idea behind these CTFs is to provide an individual with practical knowledge of the different kinds of attacks and issues in the real world.
CTF 2.0 is the latest edition of our training, which provides the most advanced modules that connect to the real infrastructures in the organizations and also assist students/professionals to prepare for global certification. This curriculum has been designed in such a manner that it accommodates both freshers and specialists and provides them with the necessary training with respect to their skills.
Prerequisites
Before opting for this course, the candidate should be aware of advanced ethical hacking techniques, networking services, OWASP top 10, Linux / Windows basic and major commands, the Unix File System, and the working of the Content Management System.
Training Modules
- CTF Categories (pwn/web/crypto/forensics/OSINT)
- Pentest Methodology
- Lab Overview
- File Permissions
- SUID/GUID
- Process Management
- Bash Scripting
- Log Analysis
- Registry
- PowerShell
- WMI
- Active Directory Basics
- Windows Event Logs
- Tool Categories
- Wordlists
- Custom Scripts
- Maintaining Persistent Access
- Service Enumeration
- SNMP
- SMB
- Web Enumeration
- Directory Bruteforcing
- Advanced Scans
- NSE Scripts
- Output Formats
- Scan Optimization
- SQLi
- XSS
- SSTI
- Deserialization
- SSRF
- XXE In CTF Context
- Hashcat
- John The Ripper
- Rule-based Cracking
- Rainbow Tables
- Custom Wordlists
- BloodHound
- Kerberoasting
- Pass-the-hash
- Silver/golden Tickets
- Empire Framework
- Agents
- Modules
- Lateral Movement
- Post-exploitation
- SSH Tunneling
- Socat
- Chisel
- Ligolo-ng
- Double Pivoting
- Metasploit
- SQLmap
- Gobuster
- Ffuf
- Nuclei
- Tool Chaining
- HTTP
- SMB
- Netcat
- Base64
- LOLBAS File Transfer Techniques
- Stack Layout
- EIP Control
- Bad Chars
- Shellcode Generation
- Immunity Debugger
- Mona.py
- SEH Overwrite
- ROP Basics
- Nessus
- OpenVAS
- Scan Configuration
- False Positive Triage
- ExploitDB
- Searchsploit
- GitHub PoC Verification
- Exploit Adaptation
- Advanced Techniques
- Antivirus Evasion
- Custom Shellcode
- Advanced Pivoting
- Pentest Report Writing