network+pentester+night+school+version+2

5
1 Strategic Security, Inc. © http://strategicsec.com/ Strategic Security Network Pentester Night School Version 2.0

Upload: emmsr888

Post on 27-Nov-2015

18 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Network+Pentester+Night+School+Version+2

1

Strategic Security, Inc. © http://strategicsec.com/

Strategic Security

Network Pentester Night School Version 2.0

Page 2: Network+Pentester+Night+School+Version+2

2

Strategic Security, Inc. © http://strategicsec.com/

Strategic Security Training

Strategic Security has a comprehensive network and

application security training program designed to

meet the needs of individuals, departments, and

organizations to develop highly skilled security

professionals.

Page 3: Network+Pentester+Night+School+Version+2

3

Strategic Security, Inc. © http://strategicsec.com/

Table of Contents

Network Pentester Night School Version 2.0 ..................................................................... 4 Class Outline ............................................................................................................... 4 Class Schedule ............................................................................................................ 5 Lab Access .................................................................................................................. 5

Session Videos ............................................................................................................ 5

Page 4: Network+Pentester+Night+School+Version+2

4

Strategic Security, Inc. © http://strategicsec.com/

Network Pentester Night School Version 2.0

I’ve revamped this entire course. Get ready because this is going to be some serious

hacking. I’ve added so many new things to this class that your head will spin.

No more MS08-067 - we are going to do to jump in and do some new stuff – some REAL

STUFF! I’m talking about going after some Windows 7 and Windows 8. Pivoting into the

network, bypassing UAC and Anti-virus, learn a bunch of new post-exploitation

techniques, steal a bunch of data and then tunnel it out of the network.

Class Outline

Week 1: Nov 4th

and 6th

- Client-Side Exploitation/Pivoting into the

Network

Client-Side Exploitation against Windows 7 and Windows 8

Bypassing UAC

Bypassing Anti-Virus

Pivoting into the network

Creating reverse tunnels with your pivot over different protocols

Scanning through your pivot

Week 2: Nov 11th

and 13th

- Post Exploitation

Getting Files On/Off System

Download and Execute against Win7/Win8

Creating Listeners/Backdoor Services

Different Kinds of Reverse Shells

Automating Tasks

Privilege Escalation

Lateral Movement

Pass The Hash

Host Enumeration

Host Data Mining

Active Directory Enumeration

Page 5: Network+Pentester+Night+School+Version+2

5

Strategic Security, Inc. © http://strategicsec.com/

Week 3: Nov 18th

and 20th

- Stealing Data and Controlling The Entire

Network

Stealing data from workstations/servers

Stealing data from databases

Deploying malware to the entire network

Executing commands on all workstations/servers

Using Staging servers for data exfiltration

Data Exfiltration over different protocols

Week 4: Nov 25th

and 27th

– Your mission

You’ll be given a description of a set of data that you have to find and extract from the

network

Class Schedule

The class will run every Monday and Wednesday from 7pm to 9:30pm EST.

Lab Access

Students will have lab network access for the entire month of November.

Session Videos

Videos of each Mon/Wed session will be recorded and sent to the students each night.