A Crash-Course on Internal Network Pentesting
We’ll cover everything you need to know to perform a basic internal penetration test over two days of lecture and lab. The schedule is jam packed, and more than likely you’ll leave without having had the chance to digest all the material or work through all the lab activities. That’s why we include a course manual and a month of private lab access after the course for you to reference and practice everything we covered in a realistic corporate network.
Who Should Take This Training:
- Anyone looking to get into penetration testing
- Entry level penetration testers
- IT Administrators with an interest in security
Pre-Requisites:
While you don’t necessarily need any prior security experience to take this course, you’ll get the most out of it with a basic grasp of the following:
- Basic Networking Concepts
- Windows Active Directory
- Windows & Linux Command Line
What to Bring:
- Laptop
- VMWare Workstation (Player is free to download)
- 20GB free HD space
- 2GB RAM available (4 preferred) for VM usage
What You’ll Get:
- Hard Copy of Course Manual
- One Month of Lab Access
- Each student gets their own lab environment
Day 1:
- Tools of the Trade a. Kali, Nmap, PowerSploit, C2 tools
- Methodology a. Vulnerability Scan vs Pentest b. Attack Chain
- Preparing for a Penetration Test a. VM and Host configuration b. Command and Control Infrastructure
- Recon and Vulnerability Discovery a. Initial Enumeration and Scanning b. Manual Information Gathering
- Unauthenticated Entry Points a. Tomcat, Jenkins, JBoss, etc b. Databases c. FTP, VNC, and other services
Day 2: 6. Local Privilege Escalation a. Windows – PowerUp, etc b. Linux 7. Lateral Movement a. Methods b. Testing and Searching for access 8. Active Directory a. Basic AD Enumeration b. Extracting domain credentials c. Kerberoasting d. Hopping Domains 9. Searching for Target Data
Instructor Bio’s"
Chris - Chris is an experienced penetration tester with 5 years in the information security industry. He’s led a diverse range of red team assessments, from internal networks, to spear-phishing exercises, to web and mobile applications. His areas of interest include exploit development, offensive security training and education, and automation and tool development.
Barrett - Barrett is also a penetration tester and security professional with experience performing a variety of red team assessments. His focus has been on assessing externally facing networks, where he has developed a number of useful automation scripts to search for, consolidate, and organize a company’s internet presence. More recently, he has created red team tools such as Invoke-PSImage for stealthy payload delivery and Invoke-WCMDump for dumping Credential Manager passwords.