This intense course covers the skills required to conduct a simulation of a sophisticated adversary, including the latest tradecraft and offensive tactics. During the training you will gain insight in to planning and conducting a red team operation including all the steps required to perform efficient opensource intelligence, design and automate the deployment of operational infrastructure, gain initial access and perform post-exploitation and lateral movement. You will learn how to bypass defensive controls including anti-virus, EDR, AMSI and application whitelisting that will leave you equipped to target even the most mature environments.
Syllabus
Introduction to red team operations
Active and passive reconnaissance
Infrastructure design concepts
Cobalt Strike and malleable profiles
Initial access techniques
Defensive evasion
Process Injection
Custom Tooling
Host triage
Persistence
Privilege escalation
Pivoting and lateral movement
Exploiting Active Directory
MacOS and Linux