Course Outline
IT and security teams are responsible for meeting cyber challenges that involve the technical layer of the organization. This course is designed to help such teams build and maintain secure networks and systems, protect data, implement vulnerability management programs, initiate strong access control measures, regularly monitor and test networks
Upcoming Meetings
There are no upcoming meetings for this course. Contact us to schedule this course, which will be customized specifically for your organization.
info@hackerupro.comModules
Enumerating an Organization
- Windows domain environment
- Domain enumeration techniques
- Manual enumeration
- Automatic enumeration
Lateral Movement
- Manual Lateral Movement
- PsExec
- WMI
- WinRM
- Pass the Hash
SMB Relay & Responder
- Broadcasting
- LLMNR Manipulation
- Hash Evolution
- Responder
- SMB Relay
- Inveigh
PowerShell as a Weapon
- PowerShell Fundamentals
- PowerShell ISE
- PowerShell Modules
- Attack with PowerShell
- PowerShell to EXE
Office Exploitation
- Macro & VBA
- Word Exploitation
- Excel as a weapon
- PowerPoint exploit
- Macro Obfuscation
- SFX
- Social Engineering technique
Exploiting Services
- Basic Enumeration
- Vulnerability search
- Services features
- SearchSploit
- Misconfiguration bugs
- RDP Enumeration
Veil Framework & Obfuscation
- What is obfuscation?
- Types of obfuscation
- Packing
- Various tools
- Tools comparison
- Multi-layered obfuscation
Reverse Shell & Tunneling
- Shell
- Reverse Shell
- Remote connections
- Firewall Evasion
- ICMP Tunneling
- SSH Tunneling
- DNS Tunneling
Kerberoasting & Pass the Ticket
- Kerberos Authentication
- Kerberos Traffic Analysis
- Kerberoasting
- Pass the Ticket
- Golden Ticket
- Domain Replications
Challenge
- The students will receive a challenge and will try to hack according to the learning material to the targeted machine/services
Prerequisites
- Basic knowledge of the Linux OS
- Basic knowledge of the Windows OS
- Basic knowledge of networking
Upcoming Meetings
There are no upcoming meetings for this course. Contact us to schedule this course, which will be customized specifically for your organization.
info@hackerupro.combuild and maintain secure networks and systems, protect data and implement vulnerability management programsDownload Full Syllabus