About The Training
Goa 2025 | Trainings
- AI Security: Terminating The Terminator
- Advanced Infrastructure Security Assessment
- Attack and Defend Software Supply Chains
- Azure Cloud Attacks for Red and Blue Teams
- Blocking the Storm: A Hands-On Guide to Hardening and Securing Kubernetes Clusters
- DevSecOps - A Hands-on Experience
- Efficient Malware Analysis: Comprehensive Approach
- HackTheWeb: Pentesting Beyond Basics
- Hacking Android Applications
- IoT Security Bootcamp GOA Edition
- Rapid Threat Model Prototyping (RTMP) - Agile Threat Modeling Mastery including Cloud and AI
- Slaying the RE Dragon: Mastering Reverse Engineering
- The Application Security Tool Stack - How to Discover Vulnerabilities in Software
Advanced Infrastructure Security Assessment
Start Date: Feb 26, 2025
End Date: Feb 28, 2025
Venue: TBA
Security systems are evolving and becoming more complex, and so are hacking techniques. Every successful compromise of the network infrastructure has to evade multiple layers of security in a perfect sequence. Imagine yourself in an environment with diverse operating systems, servers, and applications with legacy as well as in-house developed products and security solutions such as firewalls, AV, etc. How do you plan to go ahead and pwn them all? Learn to exploit and compromise targets where Metasploit will not work by default. Look inside the exploit code, and tweak them to make it work against your targets. Perform a wide array of tricks to discover, enumerate, and pwn services, systems, and domain controllers. Move around in an enterprise network with Active Directory. Analyse and exploit enterprise software components. NOTE: This is an advanced training program. The participants are expected to be familiar with network services vulnerability assessment and penetration testing, including basic ideas about vulnerabilities and their exploitation techniques.
Advanced
Day-1
- Exploiting network service to gain a foothold
- Discover network services
- Try exploitation with public tools
- Customize public exploit to gain access
- Pivoting Lab
- Pivoting using Meterpreter and SOCKS Tunnel
- Proxychains, Sliver, Chisel
- Discovering and exploiting internal network
- Hacking the Evil Corp
- Discover apps and services
- Exploit configuration weaknesses for information gathering
- AV Evasion
Day-2
- Windows Domain Exploitation
- Network discovery and gaining entry to the domain
- Credential extraction from memory
- Active Directory enumeration
- Kerberos attack
- Pass the Ticket
- Kerberoasting
- Domain privilege escalation
- Lateral Movement
- PsExec / PSSession with Hash / Ticket (PtH / PtT)
- Golden Ticket
- DCSync
Day-3
- More Lateral Movement
- ACL Abuse
- Delegation
- Unconstrained
- Constrained
- Resource-based Based Constrained Delegation
- Azure and Hybrid
- A laptop with administrator privileges
- Minimum 50 GB of free hard disk space
- Minimum 4 GB RAM for virtual machines
- A laptop should have ethernet and wifi capability (Adapters for Ethernet Connectivity).
- VM Player or VMWare Workstation installed
- Administrative rights on the laptop to disable AV.
- GitHub ID
- Note: The Apple M series will not be supported.
- Experience with vulnerability assessment and penetration testing
- Familiarity with web application security vulnerabilities
- Basic knowledge of TCP / IP network protocol
- Familiarity with virtualization tools like VMware / VirtualBox
- Penetration Tester
- Security Analyst
- Security Engineer
- Exposure to infrastructure penetration testing tools and techniques
- Exploiting enterprise network
- Live real-life scenarios
- Multi vector attacks
- Exploiting configuration vulnerabilities
A lab manual will be provided at the end of the course, which can be used as a cheat sheet in real-life engagements.
The labs used during the course are not provided/accessible after the training.
Prashant Mahajan runs Payatu Australia Pty Ltd (https://www.payatu.com.au) and OzHack (https://www.ozhack.com) and works as a Teacher at TAFENSW. He has over a decade of experience in various aspects of Information Security, including penetration testing, vulnerability analysis, digital forensics, and incident response. He is also a developer of open-source tools such as ADRecon (https://github.com/adrecon/ADRecon) and AzureADRecon (https://github.com/adrecon/AzureADRecon).
He is a founder member of Null - The Open Security Community (https://null.community) and frequently speaks at industry events and trainings.