HACKING ENTERPRISES

An immersive hands-on course aimed at a technical audience looking to increase their presence in the world of security

You will be exposed to tools, tricks and methodologies used by pentesters and hackers alike. After training completes you’ll be eager to get practicing in the in.security labs with your complementary 14 days access.

 

Outline

Our 4-day hands-on course simulates a full-scale enterprise attack scenario. It allows students to assess the situation at every stage of a complex multi-layered penetration test and teaches multiple ways to identify, enumerate, exploit and compromise an organisation. Each topic is accompanied by practical exercises to ensure underlying theory is reinforced by practical understanding and application.

The training covers a multitude of security topics, is based around modern operating systems and using modern techniques, with an emphasis on exploiting configuration weaknesses rather than throwing traditional exploits. This means logical thinking and creativity will definitely be put to the test.

This course is ideal for system administrators, network engineers, penetration testers or anyone that wants to improve their technical security skills.

The agenda for our 2019 release is detailed below. Please note that 2 and 3-day versions of this training are available upon request. Contact us on [email protected] for further information. 

Day 1
  • An introduction into monitoring and alerting using our in-LAB ELK stack
  • Leveraging OSINT activities
  • Enumerating and targeting IPv4 and IPv6 hosts
  • Linux enumeration (remote and local targets)
  • Living off the land tricks and techniques in Linux
Day 2
  • Linux shells, post exploitation and privilege escalation
  • [email protected] cracking (*nix specifics)
  • Phishing – Creation and execution using our live, simulated users
  • Living off the land tricks and techniques in Windows
Day 3
  • [email protected] cracking (Windows specifics) 
  • Windows enumeration (remote and local targets)
  • Windows exploitation and privilege escalation techniques
  • Windows Defender / AMSI and UAC bypasses
  • [email protected] cracking
  • Bypassing AppLocker and Group Policy restrictions
  • Enumerating and extracting LAPS secrets
  • RDP hijacking
  • Situational awareness and further enumeration of other subnets
Day 4
  • Lateral movement and pivoting, routing, tunnelling and SOCKS proxies
  • Application enumeration and exploitation via pivots
  • Leveragin domain trusts
  • Gaining persistence using Scheduled Tasks and WMI Event Subscriptions
  • Data exfiltration over OOB channels (ICMP and DNS)
  • Domain fronting and C2

To book a training course check out our schedule or contact us at [email protected] 

Complementary Hackpack

After training completes you will receive a Hacking Enterprises completion certificate as well as our hackpack (yours to keep) which includes:
 

  • A Hak5 LAN Turtle SD
  • A copy of The Red Team Field Manual (RTFM)
  • 14-days lab access after training concludes
  • 14-days access to a CTF platform with subnets/hosts not seen during training!
  • 14-days access to our Slack training support channel

Prerequsities

  • Good familiarity of Windows and Linux command line syntax
  • Understanding of networking concepts
  • Pentesting and/or SOC experience is advantageous but not required
  • You will need to bring a laptop with local administrator/root access

Upcoming Training

Details of all our scheduled courses can be found on our training schedule.

Whether you’re training for a qualification, learning how to break things or you want some high-level insight into the ways you may be attacked, we’ve got you covered.

Our courses are developed and delivered by trainers who have taught at many bespoke training events throughout the world, as well as Black Hat USA, Asia and EU.

We provide intensive and deeply practical hands-on training in hacking techniques, as well as a management course that helps identify what you need to be aware of without the technical know-how.

in.security training

WHERE?

We train anywhere and everywhere…

  • At your premises or required location
  • Through our training partners
  • Live virtual training
  • At special events and conferences throughout the year
in.security Certification

HACKING ENTERPRISES CERTIFICATE

After training concludes you will receive our Hacking Enterprises certificate to add to your trophy collection.

in.security Hack Lab

COMPLEMENTARY HACKLAB ACCESS

All students on our technical course will receive 14 days of free access to our labs after the course ends. Our training is intensive and we know it’s hard to retain everything learned during an event, so your extended access will allow you to continue to practice and sharpen your skills! If your insatiable thirst for hacking still isn’t satisfied you can also optionally purchase more time afterwards.

in.security Certification

WE DO THIS WITH A DIFFERENCE!

All students on our technical course will receive a complementary in.security hackpack! This includes a Hak5 LAN Turtle SD, a copy of the Red Team Field Manual (RTFM), and 14-days access to our labs, a Slack support channel and a CTF with hosts not seen during training!