برچسب: Pentest

This course delves into the powerful capabilities of Metasploit as a comprehensive tool for enterprise-level penetration testing. Designed for security professionals, SEC580 teaches participants how to utilize Metasploit to uncover vulnerabilities, develop custom exploits, and simulate real-world attack scenarios. The course covers advanced features such as pivoting, automation, and integration with other tools, empowering attendees to assess complex network environments effectively. With hands-on labs and practical exercises, SEC580 ensures mastery of Metasploit’s potential, enabling organizations to strengthen their security posture against evolving threats.

ادامه مطلب

SEC560 focuses on advanced techniques for conducting thorough penetration tests in large-scale enterprise environments. Participants will learn to assess complex networks, web applications, and systems for vulnerabilities using real-world attack strategies. The course covers both external and internal penetration testing, emphasizing effective exploitation, post-exploitation, and lateral movement techniques. With a strong hands-on approach, students will gain experience in identifying, exploiting, and mitigating risks within enterprise infrastructures. SEC560 prepares professionals to tackle the growing security challenges faced by large organizations and helps them develop comprehensive strategies for improving overall cybersecurity resilience.

ادامه مطلب

SEC467 equips security professionals with the knowledge and skills to recognize, prevent, and respond to social engineering attacks. This course delves into the psychological tactics used by attackers to manipulate individuals into divulging confidential information or compromising security systems. Through real-world scenarios and practical exercises, participants will learn to identify phishing, pretexting, baiting, and tailgating attacks, and develop effective countermeasures. SEC467 also covers ethical considerations and legal implications, providing a comprehensive understanding of social engineering threats in both organizational and personal contexts, helping professionals safeguard against these subtle yet highly effective attack methods.

ادامه مطلب

SEC575 provides a comprehensive approach to identifying, analyzing, and exploiting vulnerabilities in mobile applications on iOS and Android platforms. This course equips security professionals with the skills to perform advanced penetration testing and reverse engineering of mobile apps. Topics include secure coding practices, mobile app architecture, API security, and common vulnerabilities such as insecure data storage, improper authentication, and cryptographic flaws. Through hands-on labs and real-world scenarios, participants will learn to evaluate the security of mobile applications, uncover weaknesses, and provide actionable recommendations for remediation. SEC575 prepares attendees to tackle the unique challenges of securing mobile ecosystems effectively.

ادامه مطلب

In the Intro to Offensive Tooling class, you will learn about many of the tools used by attackers to identify vulnerabilities and exploit them. This hands-on course covers a variety of offensive tools, such as Nmap, Recon-ng, Metasploit, Proxychains, Responder, and many more. Through a series of practical labs, you will gain experience in using these tools to assess the security of systems and networks. In addition to learning how to use these tools effectively, you will also explore the ethical considerations surrounding offensive tooling, how to responsibly use these tools to protect sensitive information, and prevent cyber attacks. By the end of this course, you will have a strong foundation in offensive tooling and be well-equipped to apply your knowledge to a wide range of security challenges.

Antisyphon: Offensive Development w/ Greg Hatcher & John Stigerwalt

ادامه مطلب

As penetration testers, we all have a need to establish command and control channels in our customer environments. This can be done under the guise of an “assumed compromise” context or in a more adversarial Red Team context. The age of endpoint detection and response (EDR) solutions and application whitelisting has created significant barriers to commodity/well known malware deployment for adversarial exercises. This class focuses on the demonstration of an Open Command Channel framework called “OpenC2RAT”, and then developing, enhancing, and deploying the “OpenC2RAT” command channel software into a target environment. Students will learn about the internal details of a command channel architecture and methods to deploy in an application-whitelisted context. The class will introduce students to blocks of code written in C#, GoLang, and Python to achieve these goals. In addition, the class will introduce some ideas to deploy existing shellcode such as Cobalt Strike Beacon or Meterpreter within a programmed wrapper to enhance success in the age of modern endpoint defense. Many of the techniques introduced in this class can be used to evade modern defensive technologies.

Antisyphon: Enterprise Attacker Emulation and C2 Implant Development w/ Joff Thyer

ادامه مطلب