Duração:
1/2 dia
Próxima Data:
Consulte-nos
Local:
Online
Descrição
The routine, operational demands of a busy cybersecurity and IT department can often get in the way of good security strategy and leave you with little time to prepare for the decisions that really matter. If this sounds like your day-to-day, join this short, hands-on course. It’s designed to take you temporarily out of the ring and put you into the mind of the adversaries targeting your organization so you can adopt a more calculated approach. Plus, you can get your hands dirty with our popular virtual labs and learn from experienced, practicing Penetration Testers with a legacy of training at Black Hat as you do it.
-
All sessions will be held in English.
-
*PVP por participante. A realização do curso nas datas apresentadas está sujeita a um quórum mínimo de inscrições.
Destinatários
- Security and IT decision makers (CISOs, Heads of, budget-holding managers, etc.)
- CTOs and development Team Leads
- Network Managers
(Note: this course is not suitable for technical practitioners, such as SOC analysts, Penetration Testers, and so on.)
-
Área: Cybersecurity
-
Certificação Associada: N/A
Programa:
THE ENUMERATION PHASE
- Approaches to enumeration: opportunistic vs targeted
- IP and open port search engines
- Research-based Open-Source Intelligence Gathering (OSINT) techniques
- Vulnerability scanning
- Exercise: use OSINT to gather key information on your target
GETTING A FOOTHOLD
- Intro to Metasploit Framework (MSF)
- Search for auxiliary modules and exploits
- Exercise: use MSF to configure an exploit and get a reverse shell
ENUMERATING THE SYSTEM AND PIVOTING
- Find Privilege Escalation opportunities in Linux systems
- Enumerate internal network
- Pivot across internal systems
- Exercise: use shell to enumerate website host
TAKING A DIFFERENT APPROACH
- Server-Side Forgery (SSRF)
- Use AWS metadata API to obtain temporary credentials
- AWS CLI and list S3 buckets configuration
- Exercise: abuse SSRF vulnerability to access credentials
THE GREAT ESCAPE
- Cloud container risks
- Cloud orchestration risks
- How to abuse Docker socket
- Exercise: escape Docker container onto host OS
Pré-requisitos:
Delegates must have the following to make the most of this course:
- Intermediate to advanced cybersecurity experience
- A good understanding of basic networking technologies
- Confidence using basic computer commands
Partilha: