images
SecurityBSides Trainings

Course Description

The course teaches you a wealth of advanced Pen Testing techniques, from the neat and the new, to the ridiculous. You will learn how to compromise modern Operating Systems, networking devices and Cloud environments. From hacking Domain Controllers to local root, from VLAN Hopping and VoIP Hacking to compromising Cloud account keys, we have got everything covered.

Prerequisite

  • Prior Pentesting Experience
  • Windows and Linux Command Line Knowledge
  • Admin\root access on your laptop
  • Virtualization Software

Instructor Bio - NotSoSecure

We are a specialist IT security firm delivering high-end IT security consultancy and Training. Our team of ethical hackers produce some of the world’s top research in Application Security, Cloud and Infrastructure Security, NotSoSecure is a professional security consultancy specializing in two main areas; Penetration Testing and Hacking Training. Our work takes us around the world where we speak and provided Hacking Training at the top security events such as BlackHat, AppSec, OWASP, Ruxcon Breakpoint, Defcon, HITB, and BruCON. Our Penetration Testing work feeds into this; we apply our research and share our knowledge through our Hacking Training, white papers and tools. Check out our blog posts on the website. We are proud of our customer service - we blend leading-edge technical delivery with good old-fashioned client service taking care of the simple matters that our clients care about.

Key Learning Objective

IPV4/IPV6 SCANNING, OSINT

WEB TECHNOLOGIES

HACKING DATABASE SERVERS

WINDOWS EXPLOITATION

LINUX EXPLOITATION

AD EXPLOITATION

CONTAINER BREAKOUT

CLOUD HACKING

VPN EXPLOITATION

VLAN ATTACKS

Agenda

    • 09:00-18:00 Room#1

      Day 1:

      2023-07-04

      IPV4/IPV6 SCANNING

      • Advanced topics in network scanning
      • Understanding & exploiting IPv6 Targets
      • Advanced OSINT Data gathering

      WEB TECHNOLOGIES

      • Exploiting DVCS (git)
      • Owning Continuous Integration (CI) servers

      HACKING DATABASE SERVERS

      • Mysql
      • Postgres
      • Oracle
      • MongoDB

      WINDOWS EXPLOITATION

      • Windows Enumeration and Configuration Issues
      • Windows Desktop ‘Breakout’ and AppLocker Bypass Techniques (Win 10)
      • Local Privilege Escalation
      • A/V & AMSI Bypass techniques
      • Offensive PowerShell Tools and Techniques
      • Post Exploitation Tips, Tools and Methodology
    • 09:00-18:00 Room#1

      Day 2: Real-world Secure Boot attacks and identification

      2023-07-05

      AD EXPLOITATION

      • Active Directory Delegation Reviews and Pwnage (Win 2016 server)
      • Pass the Hash/Ticket Pivoting and WinRM Certificates
      • Cross Domain and Forest attacks
      • Pivoting, Port Forwarding and Lateral Movement Techniques
      • Persistence and backdooring techniques (Golden Ticket, DCSync, LOLBAS)
      • Command and Control (C2) Frameworks
    • 09:00-18:00 Room#1

      Day 3: Exploit Secure Boot vulnerabilities

      2023-07-06

      LINUX EXPLOITATION

      • Linux Vulnerabilities and Configuration Issues
      • Treasure hunting via enumeration
      • File Share/SSH Hacks
      • X11 Vulnerabilities
      • Restricted Shells Breakouts
      • Breaking Hardened Web Servers
      • Local Privilege Escalation
      • MongoDB exploitation
      • TTY hacks, Pivoting
      • Gaining root via misconfigurations
      • Kernel Exploitation
      • Post Exploitation and credentials harvesting
      • Persistence Techniques (Linux Capabilities)
    • 09:00-18:00 Room#1

      Day 4: Exploit Secure Boot vulnerabilities

      2023-07-07

      CONTAINER BREAKOUT

      • Breaking and Abusing Docker
      • Exploiting Kubernetes Vulnerabilities
      • Breaking out of kubernetes containers

      CLOUD HACKING

      • AWS/Azure/GCP specific attacks
      • Storage Misconfigurations
      • Credentials, API’s and token Abuse
      • IaaS, PaaS, SaaS, CaaS and Serverless exploitation
      • Azure AD Attacks

      VPN EXPLOITATION

      • Exploiting Insecure VPN Configuration

      VLAN ATTACKS

      • VLAN Concepts
      • VLAN Hopping Attacks