Date | Day | Time | Duration |
07 Nov | Monday | 0900-17:00 GST/GMT+4 | 8 Hours |
08 Nov | Tuesday | 0900-17:00 GST/GMT+4 | 8 Hours |
In this two-day training you will take a deep dive into modern day misconfigurations and attacks with labs built on fully patched Windows Server 2019, Windows 10 Enterprise and Azure Active Directory.
The course is designed to be beginner friendly but does require some basic knowledge of security concepts. You will quickly get your hands dirty with enumerating Active Directory users, groups, OUs, ACLs, ACEs etc.
Shortly after spotting the issues, you will start exploiting them to slowly move through the network and escalate privileges until becoming a domain admin. Along the way, you will gain a deep understanding of concepts such as lateral movement, different authentication protocols and tools used by red teamers and APTs.
The second day of the course takes the perspective of pivoting from the on-premises AD to compromising Azure AD. And the other way around. You will understand the difference between on-premises and cloud Active Directory, the different attack vectors and how compromising one can lead to comprising the other.
You will get a solid understanding of hybrid environments, modern authentication protocols, different ways to get, escalate and maintain access.
The course will finish with a short CTF that helps test your understanding and solidify the concepts your learned during the two days.
Watch this video to get a feel of Tarek’s online training where he explains AS-REP Roasting – a topic that is covered in more detail in the training.
- Components - Trees and forests - Enumeration
- Security principles - Security contexts - SID/RIDs - UPN - User enumeration
- Types and scope - Difference between groups and OUs - Attributes - Enumerating group and OUs
- Understanding and enumerating computer objects
- ACEs - ACLs - DACLs/SACLs - Understanding bad permissions - Enumerating permissions - Abusingpermissions
- Password profiling - Understanding password policies - Enumerating password policies - Password spraying
- PSExec, WMI, PS
- Different types of hashes - MS-NLMP - Capture NTLMv2 hashes
- Understanding LSASS - Understanding Mimikatz modules and output - Pass the hash
- Kerberos deep dive - AS-REP Roasting - Kerberoasting - Silver Ticket - Golden Ticket
What students will be provided with:-