This training is based on PurpleLABS – a dedicated virtual infrastructure for conducting detection and analysis of attackers’ behavior in terms of used techniques, tactics, procedures, and offensive tools. The environment has been set up to serve the constant improvement of competences in the field of threat hunting (threat hunting) and learning about current trends of offensive actions (red-teaming) vs detection phases (blue-teaming).
$4,299.00 Original price was: $4,299.00.$3,299.00Current price is: $3,299.00.
The primary goal of this training is to generate offensive attack events/symptoms within PurpleLABS infrastructure that later should be detected by Open Source SOC stack including Sigma – the open standard event description rule set and the rest of dedicated, open-source security solutions in use.
Participants will thoroughly familiarize themselves with the content of the available Sigma detection rules and their structure, better understand the essence of offensive actions, learn the low-level relationships between data sources, and thus achieve knowledge in creating their own detection rules and eventually bypassing them.
Introduction to Adversary Simulations and Open Source Attack Emulation projects: ● Atomic Red Team ● PurpleSharp ● RTA ● APT simulator ● Dumpster Fire ● Firebolt ● Flightsim ● BYOB ● Metta ● Infection Monkey ● Caldera and more
MITRE Attack Framework & Sigma rules → detection map based on recent examples of chained attack scenarios.
● How yara works and why it could be your best friend ● Yarascan + Volatility Framework ● memtriage ● Yara vs webshells
● Splunk ● Hunting ELK ● Wazuh ● Graylog ● Netflow ● Zeek IDS ● Suricata IDS ● Moloch FPC ● Auditd / go-audit ● eBPF ● OSquery ● Velociraptor
● Sysmon:○ Process execution events ○ Network connection events ○ Image load events ○ Named pipe events ○ WMI events ○ PSexec events ○ Process Explorer ○ Process Monitor ○ Autoruns ● Evidence traces of file download and execution: ○ cmd.exe ○ HTA ○ JS ○ VBS ○ WSF ○ JSE ○ CSharp ○ certutil ○ Powershell ○ Bitsadmin ● Shellcode injection techniques ● WebDAV / SMB / NFS share mapping
● eBPF ● sysdig
● The importance of network baseline for high-risk environments ● Virtual SPAN / TAP and Netflow → OpenVswitch ● Feature definition and extraction ● Bro-cut syntax ● Bro Script Index ● Client / server Fingerprinting: ○ JA3 ○ HASSH ● Security feature extraction per many different network protocols
● ICMP ● TCP / UDP ● SSL / TLS ● DNS / DoH / DGA / anomalies ● HTTP / HTTP2 / QUIC ● LDAP Exfil ● Dropbox / Twitter / Google / Mozilla / Discord / Slack ● SMB bind named pipes ● Legitimate website covert channel ● Intelligent HTTP C2 Redirection ● Port knocking ● Domain fronting ● ngrok / shooter ● Egress testing and common network traffic on non-standard ports
● AD Reconnaissance / AD Snapshot ● Bloodhound artifacts ● Golden Ticket ● Silver Ticket ● Kerberoasting ● RPC over TCP/IP ● DCsync / DCShadow ● Mimikatz agent/server ● Pass The Hash ● SMBexec ● Invoke-WMI ● WinRM ● Invoke-PSexec ● PSRemoting ● RDP wrapping ● Offensive Powershell: ○ WMI multiple sessions ○ Remote network relaying ○ Copy VSS ○ Keylogging ○ LSA secrets extraction ○ Sandbox / virtual environment detection ○ UAC bypassing ○ Poisoning LLMNR, NBT-NS, MDNS, WPAD and WSUS ○ SMB ransomware detection. ○ Browser pivoting ○ SSH Tunneling and pivoting ○ RDP Tunneling and pivoting / RDP Inception
● SQL ● AD / Kerberos ● SSH ● Web Apps
● Service ● Winlogon registry entries ● Run / RunOnce ● Scheduled Tasks ● Startup Folder ● WMI ● DLL
● Service ● Startup scripts ● SSH magic password ● Port knocking / iptables ● Kernel modules
● Application ● APT ● Linux ● Network ● Proxy ● Web ● Windows
“The content of in and out was great. Lots of gained knowledge and hands on!”
“Great course! A truly huge number of topics and tools covered”
“Leszek was a really good trainer, he covered a lot of material, and had a very good personality.”
“Leszek Miś is very knowledge in the topics covered in the course. He also shares real life scenario which were useful for participant to better understand application of material presented. Contents were very good, it covers many leading open source project which i find it useful. I would recommend this course to my colleagues.”