NotSoSecure - Advanced Infrastructure Hacking

Dauer

Dauer:

Nur 5 Tage

Methode

Methode:

Klassenraum / Online / Hybrid

nächster Termin

nächster Termin:

24.6.2024 (Montag)

Overview

On this 5-day accelerated Advanced Infrastructure Hacking course, you'll learn adavnced penetration techniques to exploit common operating systems and networking devices.

You'll build hands-on skills, combining NotSoSecure's sophisticated hack-lab with our unique Lecture | Lab | Review technique, which immerses you in the curriculum and allows you to fully grasp the advanced hacking techniques for infrastructure systems, helping you manage the vulnerabilities of your systems.

Your expert Firebrand instructor will take you through every aspect of network hacking, from hacking domain controllers to local root, VLAN Hopping and VoIP hacking.

You'll explore a range of networking hacking tools and techniques including:

  • IPv4 and IPv6 Refresher
  • OSINT, DVCS Exploitation
  • Database Servers
  • Windows, AD and Linux exploitation techniques
  • Container breakout
  • VPN, VoLP, VLAN exploitation

On this course, you'll get 24/7 lab access and access to NotSoSecure custom built systems with specially designed hacking challenges built to stimulate creative and innovative thinking.

This course is ideal if you're a System Administrator, SOC Analyst, Penetration Tester, Network Engineer, security enthusiast or simply want to advance your knowledge in infrastructure hacking.

Benefits

In einem Firebrand Intensiv-Training profitieren Sie von folgenden Vorteilen:

  • Zwei Optionen - Präsenz- oder Onlinetraining
  • Ablenkungsfreie Lernumgebung
  • Eigene Trainings- und Prüfungszentren (Pearson VUE Select Partner)
  • Effektives Training mit praktischen Übungseinheiten und intensiver Betreuung durch unsere Trainer
  • Umfassendes Leistungspaket mit allem, was Sie benötigen, um Ihre Zertifizierung zu erhalten, inklusive unserer Firebrand Leistungsgarantie.

Curriculum

  • Module 1: IPv4/IPv6 Scanning, OSINT
    • Advanced topics in network scanning
    • Understanding & exploiting IPv6 Targets
    • Advanced OSINT Data gathering
  • Module 2: Web Technologies
    • Exploiting DVCS (git)
    • Owning Continuous Integration (CI) servers
    • Deserialization Attacks (Java, Python, Node, PHP)
    • Dishonourable Mentions (SSL/TLS, Shellshock)    
  • Module 3: Hacking Database Servers
    • Mysql
    • Postgres
    • Oracle
    • MongoDB
  • Module 4: Windows Exploitation
    • Windows Enumeration and Configuration Issues
    • Windows Desktop ‘Breakout’ and AppLocker Bypass Techniques (Win 10)
    • Local Privilege Escalation
    • A/V & AMSI Bypass techniques
    • Offensive PowerShell Tools and Techniques
    • GPO based exploit
    • Constrained and Unconstrained delegation attack
    • Post Exploitation Tips, Tools and Methodology
  • Module 5: AD Exploitation
    • Active Directory Delegation Reviews and Pwnage (Win 2012 server)
    • Pass the Hash/Ticket Pivoting and WinRM Certificates
    • Pivoting, Port Forwarding and Lateral Movement Techniques
    • Persistence and backdooring techniques (Golden Ticket, DCSync, LOLBAS)
  • Module 6: Linux Exploitation
    • Linux Vulnerabilities and Configuration Issues
    • Treasure hunting via enumeration
    • File Share/SSH Hacks
    • X11 Vulnerabilities
    • Restricted Shells Breakouts
    • Breaking Hardened Web Servers
    • Local Privilege Escalation
    • MongoDB exploitation
    • TTY hacks, Pivoting
    • Gaining root via misconfigurations
    • Kernel Exploitation
    • Post Exploitation and credentials harvesting
  • Module 7: Container Breakout
    • Breaking and Abusing Docker
    • Kubernetes Vulnerabilities
  • Module 8: VPN Exploitation
    • Exploiting Insecure VPN Configuration
  • Module 9: VoIP Attack
    • VOIP Enumeration
    • VOIP Exploitation
  • Module 10: VLAN Attacks
    • VLAN Concepts
    • VLAN Hopping Attacks
  • Module 11: Cloud Hacking
    • AWS/Azure/GCP specific attacks
    • Storage Misconfigurations
    • Credentials, API’s and token Abuse
    • IaaS, PaaS, SaaS, CaaS and Serverless exploitation
    • Azure AD attacks

What's Included

On this course, you'll get:

  • An up-to-date collection of the latest vulnerabilities.
  • Hack lab access during and for 30 days after completing the course.

Prerequisites

Although you don't need pen testing experience, some experience in using common hacking tools such as Metasploit is recommended.

Before attending this course, you should complete the Infrastructure Hacking course, as this course builds on the principles introduced in Infrastructure Hacking.

Sind Sie sich unsicher, ob Sie die Voraussetzungen erfüllen? Wir besprechen gerne mit Ihnen Ihren technischen Hintergrund, Erfahrung und Qualifikation, um herauszufinden, ob dieser Intensivkurs der richtige für Sie ist.

Erfahrungsberichte

Bereits 134561 Kursteilnehmer haben seit 2001 erfolgreich einen Firebrand-Kurs absolviert. Unsere aktuellen Kundenbefragungen ergeben: Bei 96.41% unserer Teilnehmer wurde die Erwartungshaltung durch Firebrand übertroffen!


"Cooler Workshop mit vielen Praxisbeispielen und großer Sammlung an Links für weitere Recherchen. Am Ende gabs noch ein "capture the flag" Event um im Team nochmal das Wissen zu festigen. Würde ich sofort wieder buchen!"
S. G. , MATESO GmbH. (6.9.2021 (Montag) bis 7.9.2021 (Dienstag))

"The instructor demonstrated a high level of professionalism throughout the training sessions, maintaining interactivity and providing valuable insights essential for exam preparation. Group discussions were effectively facilitated, with the trainer strategically assigning participants to groups, fostering fruitful discussions, and subsequently presenting key points to the entire team. The course, organized by Firebrand, exhibited a well-structured curriculum that logically unfolded over the two-day training period. This thoughtful arrangement contributed to a cohesive learning experience. Furthermore, the trainer cultivated a supportive atmosphere conducive to active participation, encouraging questions and fostering meaningful discussions among participants. This approach significantly enhanced the overall quality of the training sessions."
Ryan Lopes, Volkswagen. (11.1.2024 (Donnerstag) bis 12.1.2024 (Freitag))

"Stark komprimiertes Wissen, exzellent vermittelt mit freundlichem Service."
A. R. , NCR. (18.12.2023 (Montag) bis 21.12.2023 (Donnerstag))

"Dies war mein 4. Mal. Für mich ein optimales Konzept!"
n.n.. (18.12.2023 (Montag) bis 20.12.2023 (Mittwoch))

"Dies war mein 4. Mal. Für mich ein optimales Konzept!"
n.n.. (18.12.2023 (Montag) bis 20.12.2023 (Mittwoch))

Kurstermine

Start

Ende

Verfügbarkeit

Standort

Anmelden

19.2.2024 (Montag)

23.2.2024 (Freitag)

Kurs gelaufen - Hinterlasse Kommentar

-

 

24.6.2024 (Montag)

28.6.2024 (Freitag)

Warteliste

Überregional

 

5.8.2024 (Montag)

9.8.2024 (Freitag)

Einige Plätze frei

Überregional

 

16.9.2024 (Montag)

20.9.2024 (Freitag)

Einige Plätze frei

Überregional

 

28.10.2024 (Montag)

1.11.2024 (Freitag)

Einige Plätze frei

Überregional

 

9.12.2024 (Montag)

13.12.2024 (Freitag)

Einige Plätze frei

Überregional

 

Neueste Rezensionen von unseren Kursteilnehmern