Seminarinhalt
Get the highest quality and unique learning experience – the class is limited to 20 participants by default.
Get the opportunity to interact with our world-renowned Experts.
Go through CQURE’s custom lab exercises and practice them after the course.
Receive a lifelong certification after completing the course!
Get 12-month access to the recordings!
The Winter Infrastructure Pentesting Bootcamp agenda consists of 10 Modules that will be covered during intense 5 Days.
Main takeaways:
- In-depth knowledge of reconnaissance and enumeration: You’ll learn how to map and analyze networks to spot vulnerabilities and potential entry points.
- Advanced skills in vulnerability & threat hunting: Gain expertise in using cutting-edge tools and techniques to find, understand, and exploit system weaknesses.
- Mastery of Active Directory (AD) and Azure Entra ID exploitation: Discover sophisticated attack and defense tactics for identity-based attacks.
- Proficiency in advanced Windows services attacks: Learn how to exploit and defend against attacks on critical Windows services and infrastructure.
- Expertise in enterprise exploitation and post-exploitation techniques: Understand how to exploit key enterprise services and maintain persistence within compromised networks.
Programm
Module 1. REconnaissance Techniques
- Review of goals for testing
- Mastering scanning tools
- Attacking password authentication
- Executing traffic sniffing and analysis
- Covert channel delivery and exfitration
- Understanding Windows & Linux network architecture
- Enumerationg Windows domains and workstations
- Identifying high value targets (users, admins, devices etc.)
- Itentifying roles or different machines (Domain Controllers, File Servers, etc.)
- Utilizing Nmap for operating system-specific scans
- Accessing sensitive data
Module 3: Hunting for Vulnerabilities
- Discovering live systems
- Getting information from open ports
- Miusing typical services NetBIOS, SMB, and other
- Metasploit and other tools
- Automation techniques
- Mastering Powershell / Poersploit
- Manipulating SMB, RDP, and other protocols for control and data exfiltration
Module 4: Attacks on NTLM: Execution and Mitigations
- Understanding and exploiting NTLM
- Pass-The-Hash
- NTLM relay
- NTLM attacks detections
- Hardening NTLM authentication
- Understanding and exloiting Kerberos
- Core concepts (tickets, keys, SPN)
- Authentication flow
- PKlinit
- Refreshing PAC
- Authentication Monitoring
- Pass-The-Ticket
- Silver ticket
- Golden ticket
- Keberoasting
Module 7: Advanced AD Attacks: Execution and Mitigations
- DCSync
- DCShadow
- NGC/shadow credentials
- Advanced persistence techniqueis
- Skeleton Key
- Windows Hello for Business Security
- AdminSDholder
- Offline access attacks
- Descrypting secrets with DPAPI and DPAPI-NG
- Attacks against smart card authentication
- Cloud enumeration
- On-prem to cloud pivoting
- Cloud to on-prem pivoting
- Entra ID security review
- Stealing Entra ID tokens
- Entra ID MFA and FIDO2 auditing
- Entra ID application security
- Catching signs of attack on-prem and in the Cloud
Moudle 9: Mastering Explotation of Enterprise Services
- Exploiting PKI services
- Exploiting MSSQL Severs
- Exploiting IIS
- Exploiting ADFS
- Bypassing application whitelisting
- Techniques for lateral movement recap
- BITS Jobs
- Boot or Login Autostart Execution
- Boot or Login Initialization Scripts
- Browser Extensions
- Compromising Software Binary
- Event-Triggered Execution
- External Remote SErvices
- Hijack Execution Flow
- Office Application Startup
- Scheduled Task/Job
- Server Software Component
- Traffic Signaling
- Persistence through Registry keys
- Malicious services
- Fireless malware
Zielgruppen
- Penetration tester
- Security analyst
- IT administrator
- Cybersecurity professional
- & a geek with IT background who wants to start an adventure in the cybersecurity pentesting field