Category Archives: Course Review

Course Review: InSEC Techs Metasploit training

Enroll for $110.

Nothing really original here. There are a lot of similar courses available, and I didn’t find anything that really separates this from other courses. Generally I would recommend that you work through this or this, rather than spend the money on this course. Also I should mention that Cybrary has some options that are better than this, IMO. There is mention that the course will follow the PTES standard, but I really did not see it.

OK, on to the review………..

Auxiliary Modules: We do one scan. One SYN scan of Meatsploitable. No other types of port scans, no other port scanning tools that we can import into MSF.  No specific auxiliary modules like SNMP, SMTP, SMB, FTP, SSH, etc. just one lowly port scan.

From there we went into Exploits right away, with specific modules on excellent exploits, good ranking exploits, and normal ranking exploits. All in all, there were 4 videos that discussed the exploit ranking system. Yikes! I can understand how someone might take a little time to understand that concept. Not 4 videos, especially when I am paying for the course. (disclosure: I didn’t actually pay for this, it was purchased for me.) (Also note: all of a sudden we have a windows machine we are attacking. No mentioned of that in setting up a lab. Not even the free temp machines you can use found here.

The only form of vulnerability analysis was running a Nessus scan, and then importing it into MSF. In the exploit ranking videos, they show using the exploits, with no indication of how they knew to run that specific exploit. I get it, that it is a staged environment, this is still something you should teach a new learner.

On changing the MAC attributes, I am not certain. I was taught it is the MACE attributes.

There are tons of videos on building a payload, and running it. One for with a firewall and one, without. One for PDF files, one for Word files, etc. etc. However, there is only a single lesson on what to do once you have access to the host, and this was with Armitage. No command line ideas, only how to do it in a GUI. Nothing on how to look for information on the host to further exploit the network and environment. Nothing on how to find important files, places to look for passwords, or even how to perform a privilege escalation attack if needed to further exploit a host. These are all important items to know when using metasploit.

Final Verdict: Stay Away

There are other courses that are better than this.

Course Review: InSEC Techs Cyber Security & Hacking Course

InSEC Techs – The Complete Cyber Security & Hacking Course

Various modules covering Enumeration, Scanning, System Penetration, Web Application Hacking, and so forth. You can find these courses on their website, Udemy, and other similar training portals that are slowly popping up around the web.

So to begin with, the presenter discusses the many types of courses and skills available to the teachers from InSEC Techs. I should have known something was up, when SEO & Digital Marketing were included with Ethical Hacking, CCNA, SAP All Modules. This was a very auspicious beginning, and it gave me some indication fo what I was going to be dealing with. If only it was that good.

Overall the video quality is not that great. Some videos the volume is very low. Then the next one is so loud you blow your eardrums out when you are using headphones. In my opinion this does not seem to be a truly professional training organization, but instead seems more like a fly by night operation. Sometimes the audio just flat out stops, and there is a lot of digital noise. Some videos have a lot of background noise, and it seems the presenter is sitting in an outdoor cafe. There was one video where you can here a single word overdub, which was a different voice, and at a different volume level. I had to listen to it 3 times, because I thought it was crazy.

The courses themselves only seem to go over tools and how to use them. Made me think very much like the CEH course I had previously experienced, only much worse. There is also no understandable order to the course. Other courses I have looked through follow a framework, such as PTES, or a recognized path, like the Lockheed Martin Attacker Kill Chain. (something) This course seems to move about randomly, moving from Viruses, to Social Engineering, Email Hacking, to Sniffing. Again in my opinion it would be very confusing to a new learner. There is no discussion at all about programming, which is really required for this type of work.

Some sections are downright terrible. For example, under the nmap section they run only one scan. No discussion of different types of scans, scripts that can be run, timing, evasion, or anything a real tester would need to effectively use this tool. The three methods of hacking are: Key Loggers, Trojans, and Password Cracking. The section on cracking WinRAR passwords??? REALLY??? 

The SQL Injection was not even that. The presenter opened up PHPMyAdmin, and ran the queries directly in the appropriate dialog box. No presentation of how that would look like to an attacker, or how to find it through a web form. Terrible. There are a few others that I could go into, like how is installing Truecrypt and creating a secure container file is a solid description or explanation of cryptography?

Final verdict would be to stay away from this course. Don’t waste your time, even though it is free.

offsec training post 1

So this past weekend I started the Offensive Security Training course, Penetration Testing with Kali Linux, and so far so good. The course material was downloaded without any issues, but the VM took a little bit. I was able to get everything that first night though, and tested my connection to the lab environment, which worked without a single issue. Yeah!

PWK by OCSP
Pentesting with Kali

The material is well done. Easy to follow,  and understand. I have gone through the first third so far at least once, a good chunk of it twice, and a some sections many more times. I have been taking notes as i go through material, so I can have steps and testing ideas handy when I hit the lab. This leads me to go back and repeat things, once or twice.

You might be able to tell that I have not been able to tackle anything in the lab just yet, other than testing my connection. I wanted to go through a good portion of the material first, and “sharpen my axe” so to speak. I did spend a large chunk of time with the external OSINT. I wanted to gather as much as I could externally, before getting started internally. This gave me some possible information I might be able to use in the lab environment. Maybe giving me some ideas of where I should first swing at the tree.

Their was a good portion of this weekend spent playing puzzles, or cars, or something with my daughter as well. Plus, chores, like laundry, shopping, and what not. I have the week off from work to really dig into the materials starting this morning, so we will see if I can pick up the pace a little. (I already this morning do not see much success with this, as my chat client is already exploding. Honestly had forgotten to turn it off. crap) Anyway,

Let me tackle that, and Get started on my course again!