ADVANCED INFRASTRUCTURE HACKING - 2017 EDITION
Overview
Note: This is a fast paced version of the original 4 day class, cut down to 2 days. To fit the entire training material within 2 days, the exercises have been replaced by demos which will be shown by the instructor for each exercise. Students will receive FREE 1 month lab access to practice each exercise after the class
Whether you are penetration testing, Red Teaming or trying to get a better understanding of managing vulnerabilities in your environment, understanding advanced hacking techniques is critical. This course covers a wide variety of neat, new and ridiculous techniques to compromise modern Operating Systems and networking devices.
While prior pentest experience is not a strict requirement, familiarity with both Linux and Windows command line syntax will be greatly beneficial. The following is the syllabus for the class:
Day 1:
- IPv4/IPv6 Basics
- Host Discovery & Enumeration
- OSINT & Asset Discovery
- Hacking Application and CI Servers
- Oracle Database Exploitation
- Windows Vulnerabilities and Configuration Issues
- Windows Desktop 'Breakout' and AppLocker Bypass Techniques
- A/V & AMSI Bypass techniques*
- Offensive PowerShell Tools and Techniques
- Local Privilege Escalation
- Post Exploitation Tips, Tools and Methodology
- An Introduction into Active Directory Delegation
- Pivoting, Port Forwarding and Lateral Movement Techniques
Day 2:
- Linux Vulnerabilities and Configuration Issues
- User/Service Enumeration
- NFS Hacks
- SSH Hacks
- X11 Vulnerabilities*
- Local Privilege Escalation
- Kernel Exploits
- Weak File Permissions
- SUID/SGID Scripts
- CRON Jobs*
- Inetd Services*
- VLAN Hopping*
- Docker breakout
- Hacking VoIP
- Exploiting Insecure VPN Configurations
- Switch/Router Vulnerabilities
- B33r 101
*Due to time constraints, it may not be possible to cover these topics (marked as *). However, the training material related to these topics will be provided to the attendees along with the lab access.
Who Should Take this Course
System Administrators, SOC analysts, Penetration testers, network engineers, security enthusiasts and anyone who wants to take their skills to next level.
While prior pentest experience is not a strict requirement, familiarity with both Linux and Windows command line syntax will be greatly beneficial. A further hands-on experience with common hacking tools such as Metasploit will also be beneficial, although, less advanced users can work their way up during the 30 days of complimentary lab access provided as part of the class.
Student Requirements
The only requirement for this class is that you must bring your own laptop and have admin/root access on it. During the class, we will give you VPN access to our state-of-art hacklab which is hosted in our data-center in the UK. Once you are connected to the lab, you will find all the relevant tools/VMs there. We also provide a dedicated Kali VM to each attendee on the hacklab. So, you don't need to bring any VMs with you. All you need is admin access to install the VPN client and once connected, you are good to go!
Also, note that we will use an Ethernet/wired network for this class. If your laptop does not have this capability, please carry the right adaptor to ensure you can connect to the wired network.
What Students Should Bring
The only requirement for this class is that you must bring your own laptop and have admin/root access on it. During the class, we will give you VPN access to our state-of-art hacklab which is hosted in our data-center in the UK. Once you are connected to the lab, you will find all the relevant tools/VMs there. We also provide a dedicated Kali VM to each attendee on the hacklab. So, you don't need to bring any VMs with you. All you need is admin access to install the VPN client and once connected, you are good to go!
Also, note that we will use an Ethernet/wired network for this class. If your laptop does not have this capability, please carry the right adaptor to ensure you can connect to the wired network.
What Students Will Be Provided With
Access to a hacking lab not just during the course but for 30 days after the class too. This gives them plenty of time to practice the concepts taught in the class. The lab contains a wide variety of challenges from local privilege escalation to VLAN hopping etc. Numerous scripts and tools will also be provided during the training, along with student hand-outs.
Trainers
Sumit "sid" Siddharth is the founder of NotSoSecure Ltd, a specialist IT security firm delivering high-end IT security consultancy and Training. Prior to NotSoSecure, he worked as Head of Penetration Testing for a leading IT security company in UK. He has more than 9 years of experience in Penetration Testing. Sid has authored a number of whitepapers and tools. He has been a Speaker/Trainer at many security conferences including numerous Black Hat, DEF CON, OWASP Appsec, HITB etc. Sid is also a co-author of the book SQL Injection: Attacks and Defence (2nd edition). Over the years, Sid has identified several critical flaws in leading software and helped fix these bugs. These include products from Microsoft, Oracle, Intel, Wordpress etc. He has trained several security consultants/penetration testers and helped them get better at their jobs.
Owen Shearing is an avid technology enthusiast who has worked in IT security for the past 6 years and was a trainer for AIH at Blackhat USA and EU in 2016. He is an Associate Director at NotSoSecure (www.notsosecure.com), a specialist IT security company delivering high-end IT security consultancy and training. Prior to this he was a pentester/technical trainer for a leading IT security firm. He runs the blog rebootuser.com and has authored tools which can be found at github.com/rebootuser. Over the past few years Owen has identified and responsibly disclosed vulnerabilities in various software.