Koolitaja:

Karl Raik

Aeg:

16.11 - 17.11, kell 05:00

Hind: 960.00 EUR

Hands-on Hacking Essentials (HOHE)

IT Koolitusel on hea meel kutsuda teid meie partneri Clarified Security korraldatavale 2-päevasele koolitusele Hands-on Hacking Essentials. Tegemist on praktilise koolitusega, kus antakse terviklik pilt tänapäeva küberkurjategijate võtetest: kui lihtne on tegelikult sinu arvuti ja seeläbi kogu ettevõtte või asutuse arvutivõrk üle võtta.

NB! Koolitus on inglise keeles. Koolituse toimumiseks on minimaalne osavõtjate arv 6.

Target audience:IT- ja infoturbe spetsialistid, süsteemiadministraatorid, IT helpdeski töötajad ja teised, kes ei karda käsurida. 

The results of the training  Kahepäevase koolituse tulemusena tekib osalejatel põhjalik arusaam turvatestimise olemusest ning vajadusest, ründaja mõttemaailmast ning arsenalist ja seeläbi ka parem arusaam kaitse ja monitoorimise vajadusest. Osalejad saavad kahe koolituspäeva jooksul võimaluse omal käel otsida, kompileerida ja käivitada ründeks sobivaid exploit koode ning õppida käsitlema erinevaid ründe automatiseerimise vahendeid käsureast kuni visuaalse “point-and-click” häkkimiseni Armitage abil.

Length: 16 academic hours

The prerequisite for issuing the certificate is full participation in training.

The training topics and description:

Day One (introductions, essential attack phases, concepts attack vectors and tools):

  • Introduction
  • Kali Linux intro (participant's attack platform)
  • Reconnaissance and information gathering
  • Targets (a mix of Windows and Linux workstations and servers)
  • Remote exploitation attacks
  • Privilege escalation attacks
  • Attack tool-sets and attack automation (incl. Metasploit Framework and meterpreter)
  • "Jumping the (fire)wall" with targeted client-side attacks

Day Two (putting it all together in one training scenario):

  • „Network Takeover” scenario with Kali Linux and Armitage - a whole day hands-on hacking scenario that walks participants through a small company network takeover scenario from an attacker's perspective.
  • Mostly Armitage along with other tools on Kali Linux will be used for attacking, making it easy to track and visualize how the victim network reveals itself as participants hack deeper into the network.
  • A brief reconnaissance followed by a targeted client-side attack gains your foothold. Pivoting your attacks through the initial compromised workstation and following up with local privilege escalation, scanning, password hash dumping, pass-the-hash and other attacks will deliver you the rest of the subnet. Credential and additional information harvesting, traffic capturing, data ex-filtration, steganography tools, PHP shells and other trickery will be used to compromise the rest of the subnets to find and steal steal the intellectual property you are after. We will also explain weaknesses in Windows credential handling by using tools such as Mimikatz and WCE (fairly popular tools among APT attackers) to dump plain-text passwords from any Windows version. Towards the end you will also use AV evasion tools and techniques to defeat or bypass common defense tools.
  • Your targets network consists of Windows 7, Windows XP and various Linux based firewall and server distributions.

Feedback and training wrap-up