DURATION: 3 DAYS
CAPACITY: 20 pax
SEATS AVAILABLE: REGISTRATION CLOSED
EUR2599 (early bird)
Early bird registration rate ends on the 12th of January
Pentesting and Exploiting Highly Secured Enterprise Networks is an action-packed hands-on class giving attendees a chance to perform real-world exploitation on enterprise network scenarios accompanied with practical lab exercises in a CTF style formart. The course goes far beyond simple exploitation of low-hanging fruits and shows pentesters how to perform the abilities of an advanced attacker to find out flaws in a secured networks and calculate the business risk associated with these flaws.
This training is intended for senior/experienced pentesters. Just running a vulnerability scanner and submitting that as your report provides no real benefit to a company. This goes far beyond your traditional pentesting courses. Real-world Enterprise Networks are much complex in nature, needing your special attention choosing the techniques and tools that you use in order to infiltrate. A senior penetration tester must succeed when others fail. A senior pentester doesn’t give up when particular exploit is not working, he tries to analyse the exploit and make some modification those are necessary. He should think outside of the box and come up with solutions to complex problems. He must have knowledge of all domains and his skill should range from network attacks, web attacks, scripting to system exploitation.
This training is a result of years of pentesting experience, compromising some of the highly secured networks combined into one practical and hands-on class. This course provides in-depth knowledge of the most powerful attack vectors and provides labs to perform these attacks in numerous hands-on scenarios. The course will walk through dozens of real-world attacks used by the most seasoned penetration testers. Since the class is extremely practical, expect to pop a lot of shells during the attack. The training class has a number of targets and you’ll be exploiting both Windows and Linux platforms.
We also cover topics including Exploiting private networks, Writing own python exploits, Shellcoding for customizing exploits, attacking Databases, chaining multiple vulnerabilities together to exploit the system and more. The class also gives attendees a hands-on experience with “popular” vulnerabilities such as Shellshock, Heartbleed, POODLE, Padding Oracle, JSON Web Token, SSLStrip, Kerberos Attacks (Pass-the-Hash, Pass-the-Tickets, Golden tickets, Silver tickets etc.) and more.
Attendees will be provided with hands-on experience into techniques currently used by hackers to bypass network-based enterprise intrusion detection and prevention systems (IDS/IPS), proxies, DLP, DMZ Web-application Firewalls (WAF). We will use case studies of Machine Learning for detection and evasion of IDS/IPS, AV etc. Attendees will learn learn advanced evasion techniques of corporate host-based countermeasures including antivirus, UAC by developing custom backdoors, payloads into protected enterprise networks. The training includes 50+ labs and 30+ challenges which are inspired by real world vulnerabilities and case studies.
We will build Command and Control (C2) because network intrusion may be detected and compromised system can be patched, some exploits only work once, to survive the reboot. C2 will be Stealth to avoid detection by IDS, persistence to survive reboot, encryption for secure communication and minimising possibility of firewall interference.
After the training attendees will get 1 month remote lab access free with additional 20 challenges and 5+ hours of HD videos of training walkthrough. Also before the 1 month of training, attendees will get videos on basic Assembly Language and Python Scripting which will help them in class.
Who Should Attend
- Pentesters who want to take their skills to the next level
- Security Professionals
- Network / System Admins
Key Learning Objectives
- Python programming for Scanning, Fuzzing, Keylogging, Sandbox detection etc
- Learn to use custom code in post exploitation to bypass firewall, IDS/IPS and to evade Anti Virus
- Write your own custom encoders using shellcoding
- Learn to write Python DLL Injector which will allow us to load code into remote process and have it execute within process’ context to evade firewall
- Read, edit, modify, execute scripts / shellcode downloaded from internet
- Learn how to port exploit using Powershell
- Build Command and Control (C2) infrastructure using different payload delivery methods such as VBA, Client-side exploits, HTML etc.
- Basic Networking knowledge
- Basic Windows and Linux command-line Skills
- Penetration Testing Experience
- Basic Assembly Language knowledge (Videos will be provided 1 month before the training)
- Scripting knowledge in Python (Videos will be provided 1 month before the training)
Hardware / Software Requirements
- Modern laptop with wireless networking capabilities and have admin/root access on it. (64-bit Machine)
- Minimum 4 GB RAM installed
- At least 40 GB HD Free
- VMware Workstation / Fusion installed
- Advanced Information Gathering, Network Scanning, Enumeration, Stealth Scanning Strategies
- Threat Modelling
- Simulating Advanced Persistent Threat (APT)
- Spoofing Based Attacks
- Multiple techniques for gaining man-in-the-middle network access
- IPv4 and IPv6 attacks for pentesters
- Attacking an IPSec Virtual Private Network
- Exploiting vulnerabilities in communication protocols
- Adding custom Nmap scripts to your arsenal
- Assessing Routers – Router scanning analysis, iptables network analysis
- Evaluating switches – VLAN Hopping attacks, GARP attacks, Layer two attacks
- Working with Virtual Switches Evasion
- Pentesting and Exploiting Linux Systems
- Pentesting and Exploiting Windows Systems
- Client Side Exploitation – Backdooring Executable Files, Attacking a System using Hostile Scripts
- Faster and smarter password cracking
- Custom network protocol manipulation
- Exploit routing protocol implementations
- Bypass different types of Network Access Control (NAC) implementations
- Firewalls – Mapping beyond firewall, Firewall identification, Evading Firewalls
- Intrusion Detection System / Intrusion Prevention System (IDS/IPS) – IDS/IPS identification, Evading IDS/IPS
- Antivirus – Bypassing Antivirus using different framework, Evading detection and blocks from the different endpoint protection mechanisms that may encounter during your testing, Generating compiled python executable from the raw the shellcode from Veil framework
- Using Port forward, Pivoting and Tunneling to reach out another network in real-world pentests
- Identification and Enumeration of internal network hosts
- Write Python scripts to automate testing
- Detection of Web Application Firewall and Load Balancers
- Bypassing Web Application Firewalls (WAF) – Tricks to Penetrate Firewall
- Shellcoding and customizing existing shellcodes
- Web app attacks – Advanced Cross-Site Scripting (XSS) – XSS to system compromise, Advanced SQL Injections – SQL Injection to system compromise, RCE, File uploads and more.
- Windows Domain Attacks – Modern Enumeration of Windows Environments, Controlling the Domain, Authentication Protocol Downgrade Attacks, Breaking from Restricted Desktops
- Kerberos Attacks – Pass-the-Hash, Pass-the-Tickets, Golden tickets, Silver tickets etc.
- Active Directory Exploitation
- Windows API Exploitation
- Bypassing Windows User Account Control (UAC)
- Using PowerShell in Post Exploitation Scenario
- Privilege Escalation
- Fingerprinting and Attacking CMS – WordPress, Drupal, Joomla
- Database Hacking – MySQL, SQL Server, MongoDB, Postgres, Oracle
- Insecure System/Service configuration – FTP, NTP, VNC, SNMP, WebDav, Samba etc.
- System Vulnerabilities – SMTP, SNMP, SSH
- Recent Vulnerabilities – Shellshock vulnerability, Heartbleed vulnerability, POODLE vulnerability, JSON Web Token, Padding Oracle
- Attacking Secure Socket Layer – SSL downgrade attacks, Overcoming SSL transport encryption security with SSLStrip, SSL 2.0
- Advanced memory scanning techniques
- DLL Injection
- Credential Replay Attacks
- Writing your own shellcode for Bind and Reverse TCP, Egg Hunter etc.
- Use and modify 3rd party shellcode for fun and profit
- Write your own Encoders, Decoders, Crypters to evade AntiVirus
- Create Polymorphic and Mutation code
- Buid Command and Control (C2) infrastructure for stealth, Remote File Access, Remote Command Execution