Hacking Enterprises: Exploiting in.security

Overview:

This is an immersive hands-on course that simulates a full-scale enterprise attack scenario. It allows students to assess the situation at every stage of a complex multi-layered penetration test and teaches them multiple ways to identify, enumerate, exploit and compromise an organisation.

Students will have access to a cloud-based LAB containing multiple networks, some of which are hidden. The theory and exercise content reflect real-world encounters rather than text book challenges and students will complete a vast number of exercises including everything from OSINT and reconnaissance, to creating and executing phishing campaigns against our in-LAB live bots, all the way through to post-exploitation, lateral movement and C2 exfiltration.

Swag!

We realise that 4-days is not a lot of time and therefore students are also provided with our hackpack to keep the learning going!

Student Pre-requisites:

Technical Requirements:

Agenda – Day 1

Introductions and LAB Overview

Leveraging OSINT Activities

Enumerating and Targeting IPv4 and IPv6 Hosts

Exposure to Vulnerability Assessment Toolsets

Linux Enumeration

Linux Shells, Post Exploitation and Privilege Escalation (Covered in Days 1 and 2)

Agenda - Day 2

Linux Shells, Post Exploitation and Privilege Escalation (Covered in Days 1 and 2)

P@ssw0rd Cracking (Linux)***

Windows Enumeration

Phishing

Agenda - Day 3

Windows Shells, Post Exploitation and Privilege Escalation

P@ssw0rd Cracking (Windows)

Situational Awareness, Lateral Movement and Pivoting (Covered in Days 3 and 4)

Agenda - Day 4

Situational Awareness, Lateral Movement and Pivoting (Covered in Days 3 and 4)

Application and Database Enumeration and Exploitation***

Abusing domain trusts to compromise the enterprise

Gaining Persistence & Data Exfiltration Over OOB Channels

BIO:

Owen Shearing

Owen (@rebootuser) is a co-founder of in.security Ltd., a specialist cyber security consultancy offering technical and training services based in the UK. He is a CREST CCT level security consultant with a strong background in networking and IT infrastructure and has over a decade of experience in technical security roles. Owen is experienced in delivering on and offsite consultations and security testing, as well as providing technical training to a variety of audiences at bespoke events and various conferences. He runs the blog https://rebootuser.com and keeps projects at https://github.com/rebootuser .

Will Hunt

Will Hunt (@Stealthsploit) is a cyber security consultant who has worked in IT security for over 10 years. He co-founded in.security Ltd., a specialist cyber security company delivering high-end consultancy and training services. He has delivered infrastructure and web hacking courses at Black Hat USA and EU, as well as training at other bespoke international events and conferences. Will also assists the UK government in various technical, educational and advisory capacities. Before Will was a security consultant he was an experienced digital forensics consultant and trainer. He runs the blog https://stealthsploit.com .

Register Today!