Early bird registration rate ends on the 12th of January
Pentesting and Exploiting Highly Secured Enterprise Networks is an action-packed hands-on class giving attendees a chance to perform real-world exploitation on enterprise network scenarios accompanied with practical lab exercises in a CTF style formart. The course goes far beyond simple exploitation of low-hanging fruits and shows pentesters how to perform the abilities of an advanced attacker to find out flaws in a secured networks and calculate the business risk associated with these flaws.
This training is intended for senior/experienced pentesters. Just running a vulnerability scanner and submitting that as your report provides no real benefit to a company. This goes far beyond your traditional pentesting courses. Real-world Enterprise Networks are much complex in nature, needing your special attention choosing the techniques and tools that you use in order to infiltrate. A senior penetration tester must succeed when others fail. A senior pentester doesn’t give up when particular exploit is not working, he tries to analyse the exploit and make some modification those are necessary. He should think outside of the box and come up with solutions to complex problems. He must have knowledge of all domains and his skill should range from network attacks, web attacks, scripting to system exploitation.
This training is a result of years of pentesting experience, compromising some of the highly secured networks combined into one practical and hands-on class. This course provides in-depth knowledge of the most powerful attack vectors and provides labs to perform these attacks in numerous hands-on scenarios. The course will walk through dozens of real-world attacks used by the most seasoned penetration testers. Since the class is extremely practical, expect to pop a lot of shells during the attack. The training class has a number of targets and you’ll be exploiting both Windows and Linux platforms.
We also cover topics including Exploiting private networks, Writing own python exploits, Shellcoding for customizing exploits, attacking Databases, chaining multiple vulnerabilities together to exploit the system and more. The class also gives attendees a hands-on experience with “popular” vulnerabilities such as Shellshock, Heartbleed, POODLE, Padding Oracle, JSON Web Token, SSLStrip, Kerberos Attacks (Pass-the-Hash, Pass-the-Tickets, Golden tickets, Silver tickets etc.) and more.
Attendees will be provided with hands-on experience into techniques currently used by hackers to bypass network-based enterprise intrusion detection and prevention systems (IDS/IPS), proxies, DLP, DMZ Web-application Firewalls (WAF). We will use case studies of Machine Learning for detection and evasion of IDS/IPS, AV etc. Attendees will learn learn advanced evasion techniques of corporate host-based countermeasures including antivirus, UAC by developing custom backdoors, payloads into protected enterprise networks. The training includes 50+ labs and 30+ challenges which are inspired by real world vulnerabilities and case studies.
We will build Command and Control (C2) because network intrusion may be detected and compromised system can be patched, some exploits only work once, to survive the reboot. C2 will be Stealth to avoid detection by IDS, persistence to survive reboot, encryption for secure communication and minimising possibility of firewall interference.
After the training attendees will get 1 month remote lab access free with additional 20 challenges and 5+ hours of HD videos of training walkthrough. Also before the 1 month of training, attendees will get videos on basic Assembly Language and Python Scripting which will help them in class.
Who Should Attend
Pentesters who want to take their skills to the next level
Network / System Admins
Key Learning Objectives
Python programming for Scanning, Fuzzing, Keylogging, Sandbox detection etc
Learn to use custom code in post exploitation to bypass firewall, IDS/IPS and to evade Anti Virus
Write your own custom encoders using shellcoding
Learn to write Python DLL Injector which will allow us to load code into remote process and have it execute within process’ context to evade firewall
Read, edit, modify, execute scripts / shellcode downloaded from internet
Learn how to port exploit using Powershell
Build Command and Control (C2) infrastructure using different payload delivery methods such as VBA, Client-side exploits, HTML etc.
Basic Networking knowledge
Basic Windows and Linux command-line Skills
Penetration Testing Experience
Basic Assembly Language knowledge (Videos will be provided 1 month before the training)
Scripting knowledge in Python (Videos will be provided 1 month before the training)
Hardware / Software Requirements
Modern laptop with wireless networking capabilities and have admin/root access on it. (64-bit Machine)
Minimum 4 GB RAM installed
At least 40 GB HD Free
VMware Workstation / Fusion installed
Advanced Information Gathering, Network Scanning, Enumeration, Stealth Scanning Strategies
Simulating Advanced Persistent Threat (APT)
Spoofing Based Attacks
Multiple techniques for gaining man-in-the-middle network access
IPv4 and IPv6 attacks for pentesters
Attacking an IPSec Virtual Private Network
Exploiting vulnerabilities in communication protocols
Intrusion Detection System / Intrusion Prevention System (IDS/IPS) – IDS/IPS identification, Evading IDS/IPS
Antivirus – Bypassing Antivirus using different framework, Evading detection and blocks from the different endpoint protection mechanisms that may encounter during your testing, Generating compiled python executable from the raw the shellcode from Veil framework
Using Port forward, Pivoting and Tunneling to reach out another network in real-world pentests
Identification and Enumeration of internal network hosts
Write Python scripts to automate testing
Detection of Web Application Firewall and Load Balancers
Bypassing Web Application Firewalls (WAF) – Tricks to Penetrate Firewall
Shellcoding and customizing existing shellcodes
Web app attacks – Advanced Cross-Site Scripting (XSS) – XSS to system compromise, Advanced SQL Injections – SQL Injection to system compromise, RCE, File uploads and more.
Windows Domain Attacks – Modern Enumeration of Windows Environments, Controlling the Domain, Authentication Protocol Downgrade Attacks, Breaking from Restricted Desktops
Kerberos Attacks – Pass-the-Hash, Pass-the-Tickets, Golden tickets, Silver tickets etc.
Active Directory Exploitation
Windows API Exploitation
Bypassing Windows User Account Control (UAC)
Using PowerShell in Post Exploitation Scenario
Fingerprinting and Attacking CMS – WordPress, Drupal, Joomla