{"id":3618,"date":"2021-12-01T10:20:00","date_gmt":"2021-12-01T09:20:00","guid":{"rendered":"https:\/\/grupoloyal.net\/curso-oscp-testing-with-kali-linux-pen-200\/"},"modified":"2021-12-01T10:20:00","modified_gmt":"2021-12-01T09:20:00","slug":"curso-oscp-testing-with-kali-linux-pen-200","status":"publish","type":"post","link":"https:\/\/grupoloyal.net\/curso-oscp-testing-with-kali-linux-pen-200\/","title":{"rendered":"OSCP Testing with Kali Linux (PEN-200)"},"content":{"rendered":"

[et_pb_section fb_built=\u00bb1″ fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.4.0″][et_pb_fullwidth_image src=\u00bbhttps:\/\/grupoloyal.net\/wp-content\/uploads\/2022\/02\/curso-e1645533395126.jpg\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″ min_height=\u00bb223.3px\u00bb height=\u00bb530px\u00bb][\/et_pb_fullwidth_image][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ min_height=\u00bb106px\u00bb custom_padding=\u00bb12px||0px|||\u00bb background_color=\u00bb#eaeaea\u00bb hover_enabled=\u00bb0″][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column _builder_version=\u00bb4.4.0″ type=\u00bb4_4″][et_pb_text _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

OSCP Testing with Kali Linux (PEN-200)
\n<\/h1>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ custom_padding=\u00bb52px|||||\u00bb][et_pb_row column_structure=\u00bb3_5,2_5″ _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″][et_pb_column type=\u00bb3_5″ _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″][et_pb_blurb title=\u00bbObjetivos\u00bb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-objetivos.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″ header_font_size=\u00bb19px\u00bb]
\nThis penetration testing training course introduces students to the latest ethical hacking tools and techniques,<\/p>\n

[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb2_5″ _builder_version=\u00bb4.4.0″][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-palabras-clave-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

testing<\/strong><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-elearning-300×194.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Disponible en formato e-learning<\/strong><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-presencial.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Disponible en formato presencial<\/strong><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-remoto-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Disponible en formato a distancia<\/strong><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-remoto-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Acceso al campus<\/strong><\/a><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-subvencionado-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Subvenci\u00f3n disponible<\/strong>
\nA trav\u00e9s de Fundae, cumpliendo requisitos.<\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-duracion-1-290×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Duraci\u00f3n<\/strong>
\n40 horas<\/p>\n

[\/et_pb_blurb][et_pb_counters _builder_version=\u00bb4.4.0″][et_pb_counter percent=\u00bb50″ _builder_version=\u00bb4.4.0″ percent_text_color=\u00bb#e88b00″ background_enable_color_default=\u00bbon\u00bb parallax_default=\u00bboff\u00bb parallax_method_default=\u00bbon\u00bb bar_background_color_default=\u00bb#e88b00″ use_percentages=\u00bbon\u00bb allow_player_pause_default=\u00bboff\u00bb]Dificultad[\/et_pb_counter][et_pb_counter percent=\u00bb80″ _builder_version=\u00bb4.4.0″ percent_text_color=\u00bb#e88b00″ background_enable_color_default=\u00bbon\u00bb parallax_default=\u00bboff\u00bb parallax_method_default=\u00bbon\u00bb bar_background_color_default=\u00bb#e88b00″ use_percentages=\u00bbon\u00bb allow_player_pause_default=\u00bboff\u00bb]Nivel alcanzado[\/et_pb_counter][\/et_pb_counters][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ background_color=\u00bb#eeeeee\u00bb min_height=\u00bb194px\u00bb custom_padding=\u00bb17px||19px|||\u00bb][et_pb_row column_structure=\u00bb1_2,1_2″ _builder_version=\u00bb4.4.0″][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.4.0″][et_pb_blurb title=\u00bbDirigido a\u00bb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-dirigido-a-300×268.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ child_filter_saturate=\u00bb0%\u00bb child_filter_brightness=\u00bb200%\u00bb]<\/p>\n

\n
\n<\/div>\n<\/div>\n
\n
<\/div>\n<\/div>\n

[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.4.0″][et_pb_blurb title=\u00bbConocimientos requeridos\u00bb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-skils.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ custom_margin=\u00bb||-120px|||\u00bb child_filter_saturate=\u00bb0%\u00bb child_filter_brightness=\u00bb200%\u00bb]<\/p>\n

\n
\n
\n<\/div>\n<\/div>\n
\n
<\/div>\n<\/div>\n

[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ custom_margin=\u00bb1px|||||\u00bb][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.4.0″]
\n[et_pb_text content_tablet=\u00bb\u00bb]<\/p>\n

Temario<\/h2>\n

1 Penetration Testing with Kali Linux: General Course Information
\nAbout The PWK Course
\nOverall Strategies for Approaching the Course
\nObtaining Support
\nAbout Penetration Testing
\nLegal
\nThe MegaCorpone.com and Sandbox.local Domains
\nAbout the PWK VPN Labs
\nReporting
\nAbout the OSCP Exam
\nWrapping Up
\n2 Getting Comfortable with Kali Linux
\n2.1 Booting Up Kali Linux
\n2.2 The Kali Menu
\n2.3 Kali Documentation
\n2.4 Finding Your Way Around Kali
\n2.5 Managing Kali Linux Services
\n2.6 Searching, Installing, and Removing Tools
\n2.7 Wrapping Up
\n3 Command Line Fun
\n3.1 The Bash Environment
\n3.2 Piping and Redirection
\n3.3 Text Searching and Manipulation
\n3.4 Editing Files from the Command Line
\n3.5 Comparing Files
\n3.6 Managing Processes
\n3.7 File and Command Monitoring
\n3.8 Downloading Files
\n3.9 Customizing the Bash Environment
\n3.10 Wrapping Up
\n4 Practical Tools
\n4.1 Netcat
\n4.2 Socat
\n4.3 PowerShell and Powercat
\n4.4 Wireshark
\n4.5 Tcpdump
\n4.6 Wrapping Up
\n5 Bash Scripting
\n5.1 Intro to Bash Scripting
\n5.3 If, Else, Elif Statements
\n5.4 Boolean Logical Operations
\n5.5 Loops
\n5.6 Functions
\n5.7 Practical Examples
\n5.8 Wrapping Up
\n6 Passive Information Gathering
\n6.1 Taking Notes
\n6.2 Website Recon
\n6.3 Whois Enumeration
\n6.4 Google Hacking
\n6.5 Netcraft
\n6.6 Recon-ng
\n6.7 Open-Source Code
\n6.8 Shodan
\n6.9 Security Headers Scanner
\n6.10 SSL Server Test
\n6.11 Pastebin
\n6.12 User Information Gathering
\n6.13 Social Media Tools
\n6.14 Stack Overflow
\n6.15 Information Gathering Frameworks
\n6.16 Wrapping Up
\n7 Active Information Gathering
\n7.1 DNS Enumeration
\n7.2 Port Scanning
\n7.3 SMB Enumeration
\n7.4 NFS Enumeration
\n7.5 SMTP Enumeration
\n7.6 SNMP Enumeration
\n7.7 Wrapping Up
\n8 Vulnerability Scanning
\n8.1 Vulnerability Scanning Overview and Considerations
\n8.2 Vulnerability Scanning with Nessus
\n8.3 Vulnerability Scanning with Nmap
\n8.4 Wrapping Up
\n9 Web Application Attacks
\n9.1 Web Application Assessment Methodology
\n9.2 Web Application Enumeration
\n9.3 Web Application Assessment Tools
\n9.4 Exploiting Web-based Vulnerabilities
\n9.5 Extra Miles
\n9.6 Wrapping Up
\n10 Introduction to Buffer Overflows
\n10.1 Introduction to the x Architecture
\n10.2 Buffer Overflow Walkthrough
\n10.3 Wrapping Up
\n11 Windows Buffer Overflows
\n11.1 Discovering the Vulnerability
\n11.2 Win Buffer Overflow Exploitation
\n11.3 Wrapping Up
\n12 Linux Buffer Overflows
\n12.1 About DEP, ASLR, and Canaries
\n12.2 Replicating the Crash
\n12.3 Controlling EIP
\n12.4 Locating Space for Our Shellcode
\n12.5 Checking for Bad Characters
\n12.6 Finding a Return Address
\n12.7 Getting a Shell
\n12.8 Wrapping Up
\n13 Client-Side Attacks
\n13.1 Know Your Target
\n13.2 Leveraging HTML Applications
\n13.3 Exploiting Microsoft Office
\n13.4 Wrapping Up
\n14 Locating Public Exploits
\n14.1 A Word of Caution
\n14.2 Searching for Exploits
\n14.3 Putting It All Together
\n14.4 Wrapping Up
\n15 Fixing Exploits
\n15.1 Fixing Memory Corruption Exploits
\n15.2 Fixing Web Exploits
\n15.3 Wrapping Up
\n16 File Transfers
\n16.1 Considerations and Preparations
\n16.2 Transferring Files with Windows Hosts
\n16.3 Wrapping Up
\n17 Antivirus Evasion
\n17.1 What is Antivirus Software
\n17.2 Methods of Detecting Malicious Code
\n17.3 Bypassing Antivirus Detection
\n17.4 Wrapping Up
\n18 Privilege Escalation
\n18.1 Information Gathering
\n18.2 Windows Privilege Escalation Examples
\n18.3 Linux Privilege Escalation Examples
\n18.4 Wrapping Up
\n19 Password Attacks
\n19.1 Wordlists
\n19.2 Brute Force Wordlists
\n19.3 Common Network Service Attack Methods
\n19.4 Leveraging Password Hashes
\n19.5 Wrapping Up
\n20 Port Redirection and tunnelling
\n20.1 Port Forwarding
\n20.2 SSH tunnelling
\n20.3 PLINK.exe
\n20.4 NETSH
\n20.5 HTTP Tunnelling Through Deep Packet Inspection
\n20.6 Wrapping Up
\n21 Active Directory Attacks
\n21.1 Active Directory Theory
\n21.2 Active Directory Enumeration
\n21.3 Active Directory Authentication
\n21.3.5 Low and Slow Password Guessing
\n21.4 Active Directory Lateral Movement
\n21.5 Active Directory Persistence
\n21.6 Wrapping Up
\n22 The Metasploit Framework
\n22.1 Metasploit User Interfaces and Setup
\n22.2 Exploit Modules
\n22.3 Metasploit Payloads
\n22.4 Building Our Own MSF Module
\n22.5 Post-Exploitation with Metasploit
\n22.6 Metasploit Automation
\n22.7 Wrapping Up
\n23 PowerShell Empire
\n23.1 Installation, Setup, and Usage
\n23.2 PowerShell Modules
\n23.3 Switching Between Empire and Metasploit
\n23.4 Wrapping Up
\n24 Assembling the Pieces: Penetration Test Breakdown
\n24.1 Public Network Enumeration
\n24.2 Targeting the Web Application
\n24.3 Targeting the Database
\n24.4 Deeper Enumeration of the Web Application Server
\n24.5 Targeting the Database Again
\n24.6 Targeting Poultry
\n24.7 Internal Network Enumeration
\n24.8 Targeting the Jenkins Server
\n24.9 Targeting the Domain Controller
\n24.10 Wrapping Up
\n25 Trying Harder: The Labs
\n25.1 Real Life Simulations
\n25.2 Machine Dependencies
\n25.3 Cloned Lab Machines
\n25.4 Unlocking Networks
\n25.5 Routing
\n25.6 Machine Ordering & Attack Vectors
\n25.7 Firewall \/ Routers \/ NAT
\n25.8 Passwords<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ background_color=\u00bb#032b35″][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.4.0″][et_pb_contact_form captcha=\u00bboff\u00bb title=\u00bbSolicita informaci\u00f3n del curso\u00bb submit_button_text=\u00bbSolicitar informaci\u00f3n ahora\u00bb _builder_version=\u00bb4.4.0″ title_text_color=\u00bb#ffffff\u00bb title_font_size=\u00bb30px\u00bb][et_pb_contact_field field_id=\u00bbName\u00bb field_title=\u00bbNombre\u00bb _builder_version=\u00bb3.16″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbEmail\u00bb field_title=\u00bbDirecci\u00f3n de correo electr\u00f3nico\u00bb field_type=\u00bbemail\u00bb _builder_version=\u00bb3.16″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbEmpresa\u00bb field_title=\u00bbEmpresa\u00bb fullwidth_field=\u00bbon\u00bb _builder_version=\u00bb4.4.0″][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbMessage\u00bb field_title=\u00bbCu\u00e9ntanos un poco sobre tus necesidades\u00bb field_type=\u00bbtext\u00bb fullwidth_field=\u00bbon\u00bb _builder_version=\u00bb4.4.0″ form_field_text_color=\u00bb#555555″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

40 horas<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"2880","footnotes":""},"categories":[9,11,71],"tags":[],"class_list":["post-3618","post","type-post","status-publish","format-standard","hentry","category-cursos","category-cursos-de-it","category-testing"],"acf":[],"_links":{"self":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts\/3618","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/comments?post=3618"}],"version-history":[{"count":0,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts\/3618\/revisions"}],"wp:attachment":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/media?parent=3618"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/categories?post=3618"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/tags?post=3618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}