CSX Vulnerability and Exploitation Course
SELF-PACED, VIRTUAL COURSE
Build your technical skills with immersive, hands-on training in a live network environment.
6 months access
ISACA Member: $250
The CSX Vulnerability and Exploitation Course provides students, who possess a basic understanding of penetration testing, a deeper understanding of vulnerability identification and exploitation capabilities. Students will work with real systems in real environments and will leverage real vulnerability analysis and exploitation tools in a live environment. Upon completion, students will understand how to successfully exploit and maintain a presence within information systems.
The CSX Vulnerability and Exploitation course is conducted in an adaptive, performance-based cyber laboratory environment. Students will have hands-on instruction and practice in applying basic concepts and industry-leading methods and in utilizing a large array of open source tools within real-world scenarios.
- Open Source Research
- Initial Vulnerability Scanning
- Vulnerability Identification
- Basic Exploitation
- Privilege Escalation
- Backdoor Implants
- Covering Tracks
- System Exploration
- Initial Vulnerability Scanner Setup
- Vulnerability Analysis
- Initial Exploitation
- Privilege Escalation
- Backdoor Implementation
- Covering Tracks
- Deeper Exploration
- CVEC Challenge
CSX Vulnerability and Exploitation Course Outline
Open Source Research
- Understand footprinting
- Conduct target research
- Perform “Google hacking”
This lab instructs students on the basics of open source researching a target domain.
Initial Vulnerability Scanning
- Discover known vulnerabilities
- Learn vulnerability scanner implementation
- Prepare vulnerability scanners
Initial Vulnerability Scanner Setup
OpenVAS is a popular open-source vulnerability scanner and management tool. One of the tools included with OpenVAS is the Greenbone Security Assistant (GSA), a web application which connects to the OpenVAS manager daemon to provide a GUI for vulnerability management. In this lab, you'll become familiar with how these tools work and how to use them.
- Research vulnerabilities
- Identify vulnerability severity
- Identify patch levels
Conducting a vulnerability scan is important. In this lab, students will learn how to interpret the results from the vulnerability scans.
- Match a vulnerability with an exploit
- Successful post exploitation steps
- Additional post exploitation failure research
It's important to realize not all exploits require scripted code and payloads. Sometimes a simple Nmap scan - coupled with a Telnet connection and a clever username - is all you need!
- Learn system privileges
- Remote compile local exploits
- Escalate privileges
- Establish Netcat listeners
Privilege escalation exploits are one of the most common exploit types. By exploiting flaws in the OS, this type of exploit allows a user to elevate their level of system access. Once elevated, a user can make permanent changes and gain control of the vulnerable system.
- Learn backdoors
- Establish a backdoor
This lab will take students through creating backdoors in systems as well as implementing inadvertent backdoors and exploitations.
- Learn how to cover tracks after an exploitation
- Modify date/time stamps on files
- Search logs for evidence
- Delete evidence from logs
When a system is accessed, either by normal or clandestine operations, evidence is left behind in log files. Sanitation of those log files is important to cover up any activity that had taken place.
- Identify valuable information
- Discover password files on a system
- Crack discovered passwords
- Identify open network file shares
Once a system has been compromised with administrator level access all sensitive system information is available to the attacker. In this lab, we'll take you through obtaining that system information.
This is a challenge lab for the CVEC series which is based on the materials covered in the previous 8 labs.