25.8.14
This website uses cookies to ensure you get the best experience on our website. Learn more

Ability Driven Red Teaming

Been doing the pentest thing for a minute but now ready to learn a few more tricks from the old guys? This four day training is lead by three instructors who aren’t here to sell you a product and only one of them wants you to sign up for pentest work. With over three decades and hundreds of pentests of combined instructor experience, this training is so cutting edge your fingertips might be missing by the end. The TTP’s are so hard it will make you want to get knuckle tats. We won’t be tying you to any particular OS or tool we wrote and all OS’s, exploit frameworks, and programming languages are welcome. Metasploit Mastery’s two days just weren’t enough to cover all the things. Now with 4 days, we get to push the envelope and teach past our Meterpreter roots ~ #: In this course we will walk you through how we Build Red Team Infrastructure Use OSINT to Ggt Initial Access Social Engineering (electronic) Attack AD, including Kerberos, Azure, and SMB Break into and persist in cloud environments (AWS/GCP) Find Common DevOps vulns Use Web App attacks that give you shells Extend Metasploit, Empire and other frameworks to do your bidding Privilege Escalation, Pivoting (lateral movement) & Persistence on Windows, OSX, and Linux Avoid common detections for all of the above We’ll do the above in a brand new for 2019 custom-built CTF environment where you’ll pwn a variety of boxes in a variety of environments including AWS & Google Cloud.

Skills / Knowledge

  • PenTesting
  • Network

Issued on

August 6, 2019

Expires on

Does not expire