network+pentester+night+school+version+2
Post on 27-Nov-2015
18 Views
Preview:
TRANSCRIPT
1
Strategic Security, Inc. © http://strategicsec.com/
Strategic Security
Network Pentester Night School Version 2.0
2
Strategic Security, Inc. © http://strategicsec.com/
Strategic Security Training
Strategic Security has a comprehensive network and
application security training program designed to
meet the needs of individuals, departments, and
organizations to develop highly skilled security
professionals.
3
Strategic Security, Inc. © http://strategicsec.com/
Table of Contents
Network Pentester Night School Version 2.0 ..................................................................... 4 Class Outline ............................................................................................................... 4 Class Schedule ............................................................................................................ 5 Lab Access .................................................................................................................. 5
Session Videos ............................................................................................................ 5
4
Strategic Security, Inc. © http://strategicsec.com/
Network Pentester Night School Version 2.0
I’ve revamped this entire course. Get ready because this is going to be some serious
hacking. I’ve added so many new things to this class that your head will spin.
No more MS08-067 - we are going to do to jump in and do some new stuff – some REAL
STUFF! I’m talking about going after some Windows 7 and Windows 8. Pivoting into the
network, bypassing UAC and Anti-virus, learn a bunch of new post-exploitation
techniques, steal a bunch of data and then tunnel it out of the network.
Class Outline
Week 1: Nov 4th
and 6th
- Client-Side Exploitation/Pivoting into the
Network
Client-Side Exploitation against Windows 7 and Windows 8
Bypassing UAC
Bypassing Anti-Virus
Pivoting into the network
Creating reverse tunnels with your pivot over different protocols
Scanning through your pivot
Week 2: Nov 11th
and 13th
- Post Exploitation
Getting Files On/Off System
Download and Execute against Win7/Win8
Creating Listeners/Backdoor Services
Different Kinds of Reverse Shells
Automating Tasks
Privilege Escalation
Lateral Movement
Pass The Hash
Host Enumeration
Host Data Mining
Active Directory Enumeration
5
Strategic Security, Inc. © http://strategicsec.com/
Week 3: Nov 18th
and 20th
- Stealing Data and Controlling The Entire
Network
Stealing data from workstations/servers
Stealing data from databases
Deploying malware to the entire network
Executing commands on all workstations/servers
Using Staging servers for data exfiltration
Data Exfiltration over different protocols
Week 4: Nov 25th
and 27th
– Your mission
You’ll be given a description of a set of data that you have to find and extract from the
network
Class Schedule
The class will run every Monday and Wednesday from 7pm to 9:30pm EST.
Lab Access
Students will have lab network access for the entire month of November.
Session Videos
Videos of each Mon/Wed session will be recorded and sent to the students each night.
top related