A Crash-Course on Internal Network Pentesting

We’ll cover everything you need to know to perform a basic internal penetration test over two days of lecture and lab. The schedule is jam packed, and more than likely you’ll leave without having had the chance to digest all the material or work through all the lab activities. That’s why we include a course manual and a month of private lab access after the course for you to reference and practice everything we covered in a realistic corporate network.

Who Should Take This Training:

Pre-Requisites:

While you don’t necessarily need any prior security experience to take this course, you’ll get the most out of it with a basic grasp of the following:

What to Bring:

What You’ll Get:

Day 1:

  1. Tools of the Trade a. Kali, Nmap, PowerSploit, C2 tools
  2. Methodology a. Vulnerability Scan vs Pentest b. Attack Chain
  3. Preparing for a Penetration Test a. VM and Host configuration b. Command and Control Infrastructure
  4. Recon and Vulnerability Discovery a. Initial Enumeration and Scanning b. Manual Information Gathering
  5. Unauthenticated Entry Points a. Tomcat, Jenkins, JBoss, etc b. Databases c. FTP, VNC, and other services

Day 2: 6. Local Privilege Escalation a. Windows – PowerUp, etc b. Linux 7. Lateral Movement a. Methods b. Testing and Searching for access 8. Active Directory a. Basic AD Enumeration b. Extracting domain credentials c. Kerberoasting d. Hopping Domains 9. Searching for Target Data

Instructor Bio’s"

Chris - Chris is an experienced penetration tester with 5 years in the information security industry. He’s led a diverse range of red team assessments, from internal networks, to spear-phishing exercises, to web and mobile applications. His areas of interest include exploit development, offensive security training and education, and automation and tool development.

Barrett - Barrett is also a penetration tester and security professional with experience performing a variety of red team assessments. His focus has been on assessing externally facing networks, where he has developed a number of useful automation scripts to search for, consolidate, and organize a company’s internet presence. More recently, he has created red team tools such as Invoke-PSImage for stealthy payload delivery and Invoke-WCMDump for dumping Credential Manager passwords.

Register Today!