Black Hat West Coast Trainings Home Black Hat West Coast Trainings Home Black Hat West Coast Trainings Registration Black Hat West Coast Trainings Registration Black Hat West Coast Training Black Hat West Coast Trainings Summit Black Hat West Coast Trainings Schedule Black Hat West Coast Trainings Schedule Black Hat West Coast Trainings Sponsors Black Hat West Coast Trainings Sponsors Black Hat West Coast Trainings Venue Black Hat West Coast Trainings Venue
 
 

On This Page

Tactical Exploitation 4 Day

Attack Research | December 9-12


 Early

$3900

Ends Oct 24
11:59PM EST

 Regular

$4100

Ends Dec 5
11:59PM EST

 Late

$4400

Ends Dec 12



Overview

Penetration testing often focuses on individual vulnerabilities and services, but the quickest ways to exploit are often hands on and brute force. This four-day course introduces a tactical approach that does not rely on exploiting known vulnerabilities. Using a combination of new tools and lesser-known techniques, attendees will learn how hackers compromise systems without depending on standard exploits. The class alternates between lectures and hands-on testing, providing attendees with an opportunity to try the techniques discussed.

In the first half of the course, attendees will come to a new understanding of how to use the Metasploit Framework and how to harness this new found understanding. Our attention will turn to the initial target exploitation with a significant amount of target modeling, which includes, unique Attack Research only methods of reconnaissance and how to tie that in with initial exploitation phases. This section will include a section on malware for pen testers. This section gives students new tools for creating malware on the fly. The coding section is not based around metasploit but will show students how to leverage a few other languages in combination with metasploit to create new and unique exploits and payloads.

The class will then move into unique less known tactics for taking down windows domains regardless of how old or new they are. This section of the class is based heavily upon post exploitation techniques perfected by Attack Research. Students will walk away being able to compromise any windows host regardless if it is the newest OS or not. In the second half of the course, the focus will shift from compromising Windows based networks to a true production level Windows/Unix enterprise environment. Students will learn complete domination of a true production Windows/Unix environment, but they will also learn PSP evasion, unique stealth approaches, persistence mechanisms, and varying degrees of collection strategies. Students will receive in-depth exploitation techniques for becoming root in any Unix environment and abusing these newly found resources. Attendees will learn how to compromise common operating systems, and once in, how to gain access to the rest of the network.

This course is well-suited to penetration testers of any skill level and all security professionals who have a basic grasp of networking and software exploits. This course differs from a typical ethical hacking program in that the focus is on techniques that are not affected by patch levels. A portion of the class will be dedicated to building new tools, on the fly, to solve the challenges posed by a difficult penetration test.

Students will test all of the skills they have gained in the course against a virtual network specially designed for the class. The labs will be interwoven into the lecture so that students will receive a significant amount of time practically exercising these new skills as they learn. By the end of the class students will have spent 50% of the time in a lab environment.


What Makes Your Course Unique?

Attack Research has a unique approach to network and system exploitation. We have recently expanded our Tactical Exploitation class to a new 4 day version that dives deeper into the Attack Research methodology to exploitation. This four-day course introduces a tactical approach that does not rely on exploiting known vulnerabilities. Using a combination of new tools and lesser-known techniques, attendees will learn how hackers compromise systems without depending on standard exploits.


Who Should Take This Course

IT professionals interested in offensive and defensive techniques and tools for securing environments. Security professionals engaged in pentesting, redteaming or other offensive security testing. Security professionals engaged in incident response, computer forensics or other defensive security work.


Student Requirements

Student machines must be able to run at least 2 virtual machines utilizing either: VMWare Workstation (which can be obtained through a demo license) or Virtual Box. This usually means at least 4 gig’s of memory is needed.

Student laptops must be running either OSX, Linux, or Windows and they must have the ability to disable all antivirus on the machine, or remove it. Students must have administrative access on their machine for sniffing traffic, adjusting firewalls, etc,

Students must have:


What Students Should Bring

See Student Requirements


What Students Will Be Provided With

Students will walk away from the class with full documentation and the entire custom and noncustom tools that we have given them or they have designed in class. In our previous Black Hat Las Vegas AR released a number of Windows 7 post exploitation tools that no one has ever seen or heard of and they were made available only to the class. Students walk away from AR training sessions with more than just the “usual” training materials but a wealth of knowledge for both attacking and defending networks. AR brings all of the hardware and software necessary for the class training environment.


Trainers

Russ Gideon([email protected])
Russ has many years of experience in information security fulfilling many diverse roles from being a core component of an Incident Response operation to running effective Red Teams from across the United States government. Russ excels both at malware reverse engineering, which enables him to deeply understand how the attackers do what they do, as well as at high end Red Teaming where he has to penetrate sophisticated and well protected high value systems. Russ currently serves as the Director of Malware Research and Training at Attack Research.

Val Smith ([email protected])
Val Smith has been involved in the computer security community and industry for over ten years. He currently works as a professional security researcher on a variety of problems in the security community. He specializes in penetration testing (over 40,000 machines assessed), reverse engineering and malware research. He works on the Metasploit Project development team as well as other vulnerability development efforts. Most recently Val Smith founded Attack Research which is devoted to deep understanding of the mechanics of computer attack. Previously Val Smith founded Offensive Computing, a public, open source malware research project.

Colin Ames ([email protected])
Colin Ames is a security researcher with Attack Research LLC where he consults for both the private and public sectors. He's currently focused on Pen testing, Exploit Development, Reverse Engineering, and Malware Analysis.

Dave Kerb ([email protected])
David Kerb has worked in the computer security arena for the past ten years. He has specialized in reverse engineering, malware research, and penetration testing. During the past ten years he has worked with various places including Offensive Computing, a Malware Research Company. He is currently conducting research at Attack Research which is set up to help understand the internals of attacks. Dave Kerb has focused on *nix systems and enjoys figuring out how to abuse various trust relations between *nix systems..