Attacks over GSM with Project Mayhem
Overview
Day 1: Hands-on Learning and Construction
- Introduction to the Project Mayhem Kit
- TCP/IP & Networking Overview
- GSM Overview
- Penetration Testing Concepts
- Pivoting
- Red Team Tactics Overview
- Configuring Attack Boxes
- Hands on Network Enumeration
- Hands on Metasploit Introduction
- Privilege Escalation Basics
- Soldering Mayhem Components
Day 2: Exploration and Pentesting
- Configuring Mayhem Kit
- Basic Scripting Logic
- Windows Exploitation
- Linux Exploitation
- Bypassing Perimeter Defense Systems
- Social Engineering Concepts
- Covert Concealment and Placement Techniques
- Manually Connect to Pivot Server (Testing Connections)
- Red Team Activity
- Gaining Access to Target
- Place the Covert Device
- Getting Mayhem Kit Connected
- Automating with Scripts
- Connection & Persistence
- Bridging the Gap
- CTF
- Target Environment Enumeration
- Isolating a Target
- Exploiting the Target
- Data Extraction
Who Should Take this Course
This training is directed towards any security professional who is interested in the latest technology that can be used to leverage your organization's private or secure data. No prior experience is required. In this training attendees will be introduced to several entry level hacking and Red-Team tactics and methodologies that are the perfect compliment to any security professional. This should be considered an entry level hacking experience offering a tremendous growth potential for students.
Student Requirements
The requirement for this class is that each attendee will need to supply their own laptop and have full administrator / root access. It would help, but not required that attendees have basic knowledge about Linux, Virtualization and basic networking! Do not worry, we will be covering the basics about these subjects and we will ensure every student grasps those concepts.
What Students Should Bring
A laptop with:
- 64bit Host operating system
- A minimum 8 GB RAM installed
- VMware Workstation / Fusion installed
- (We will provide a Flash Drive with Virtualbox for those who do not have their own virtualization software)
- At least 40 GB HD free
- Wired and Wireless support
What Students Will Be Provided With
Attendees will go home with a complete Mayhem kit which includes:
- Raspberry Pi3 Starter CANA-Kit (1)
- 32GB SD card (1)
- Adafruit FONA-GSM (1)
- Deployment Battery (1)
- Covert Assembly (1)
- Pelican carry case (1)
- T-Mobile SIM starter kit (1)
- Raspberry Pi3 Screen 3.5 inch (1)
- Compact keyboard and mouse (1)
- A fun, exciting and Hands-on learning experience (∞)
- Flash Drive with Software and goodies (1), Kali Linux, Virtualbox, scripts and Vulnerable VM's.
Trainers
Stephen Chicosky is the CEO and Co-Founder of Antimatter Security, LLC, and is a former Information Technology Specialist with the United States Army. He has considerable experience in application security, penetration testing and Red team engagements. He has been responsible for active security research and development of new technology. Additionally, Stephen is actively engaged in the security community. He is OSCP Certified and earned two Bachelors of Science degrees, the first in Network Security and the second in Network Engineering.
William Peterson is COO and Co-Founder of Antimatter Security, LLC, a Security company focusing in Penetration Testing. He is the founder and former CEO of Traken Technologies, LLC, a tech start-up developing a secure mobile framework for cloud computing. William also served as CTO of Inertial Innovations, Inc. that was developing early model drones for local police departments, solar companies and public use. He is a United States Marine and former United States Army Soldier. After 14 years of service in the United States Military, he was medically ineligible to reenlist and chose to be re-educated in the civilian sector as an Information Security and Forensics professional. William is employed as a Vulnerability Assessment Engineer and Penetration Tester. He is a security enthusiast and entrepreneur by heart. Mr. Peterson earned two Bachelor of Science degrees, the first in Network Security and the second in Technology Forensics.
Ken Welch is the Chief Technical Officer (CTO) of Antimatter Security, LLC and is a skilled Penetration Tester. He earned a Bachelor of Science Degree in Network Security and is a lifetime student of the Information Security world. Ken earned the OSCP Certification and is always looking for new and exciting challenges to engage in. Giving back to the community is always at the forefront, and Ken does his part by helping to organize and maintain a security group, also serving as a mentor to several security enthusiasts. In his spare time, he engages in security based Capture the Flag events, participates in several bug bounty programs and Volunteers at Security Conferences as an ambassador to the attendees.