Security systems are evolving and becoming more complex, and so are hacking techniques. Every successful compromise of the network infrastructure has to evade multiple layers of security in a perfect sequence. Imagine yourself in an environment with diverse operating systems, servers, and applications with legacy as well as in-house developed products and security solutions such as firewalls, AV, etc. How do you plan to go ahead and pwn them all?
Learn to exploit and compromise targets where Metasploit will not work by default. Look inside the exploit code, and tweak them to make it work against your targets. Perform a wide array of tricks to discover, enumerate, and pwn services, systems, and domain controllers. Move around in an enterprise network with Active Directory. Analyse and exploit enterprise software components.
NOTE: This is an advanced training program. The participants are expected to be familiar with network services vulnerability assessment and penetration testing, including basic ideas about vulnerabilities and their exploitation techniques.
Training level: Advanced
Day-1
Day-2
Day-3
There will be a lab manual provided at the end of the course, which can be used as a cheat sheet in real-life engagements.
The labs used during the course are not provided/accessible after the training.
Prashant Mahajan is a Director at Payatu Australia Pty Ltd (https://www.payatu.com.au). He has over a decade of experience with various aspects of Information Security including penetration testing, vulnerability analysis, digital forensics, and incident response.
He is also a developer of open-source tools such as ADRecon (https://github.com/adrecon/ADRecon) and AzureADRecon (https://github.com/adrecon/AzureADRecon), a founder member of Null - The Open Security Community (https://null.community) and a frequent speaker at industry events and training.