Enterprise Infrastructure Hacking [EIH]
SensePost Training
"This course is all about compromising companies through their internal infrastructure. Aimed at penetration testers and technically minded people wanting to understand how to go about compromising their companies through their infrastructure. We explore the attacks and how to defend it."
Format: 2 Days In-person
Audience level: Beginner, Intermediate
This course is all about compromising companies through their internal infrastructure. Key Points: • Attacking large scale internal infrastructure • Finding internal vulnerabilities and exploiting them • How active directory networks can be abused to suit your needs Aimed at penetration testers and technically minded people wanting to understand how to go about compromising their companies through their infrastructure. We explore the attacks and how to defend it. This course will take you on a journey from learning about an organisations right through to the stealthy exploitation of their critical infrastructure. This course stems out of the security assessments we've been providing our clients over the last 21 years. It teaches the techniques used by our penetration testers on a daily basis and includes a few interesting stories we have seen in the field.
Key Points:
• Attacking large scale internal infrastructure
• Finding internal vulnerabilities and exploiting them
• How active directory networks can be abused to suit your needs
Aimed at penetration testers and technically minded people wanting to understand how to go about compromising their companies through their infrastructure. We explore the attacks and how to defend it.
This course will take you on a journey from learning about an organisations right through to the stealthy exploitation of their critical infrastructure.
This course stems out of the security assessments we've been providing our clients over the last 21 years. It teaches the techniques used by our penetration testers on a daily basis and includes a few interesting stories we have seen in the field.
Details:
• 2-day course
• 60% practical and 40% theoretical
• Fully hands-on, intermediate to advanced level course
• Delivered by active penetration testers
Topics covered:
• Basics about networks and organisations
• Reconnaissance
• Footprinting
• Fingerprinting
• Vulnerability discovery
• Exploitation
• Post-Exploitation
• Advanced Active Directory exploitation
• Introduction to Blue Teaming
Our training facility is delivered via SensePost, the specialist pentesting arm of Orange Cyberdefense.
SensePost have trained thousands of students on the art of network and application exploitation for the past decade. It’s safe to say we enjoy teaching others how to own networks and applications. Our courses are developed from the work we perform for clients, so that you get a better understanding of how to exploit real-world scenarios. As one of Blackhat briefings longstanding training partners since 2002, our courses have taught thousands of students about the art of offensive and defensive approaches.
Join us and hack hard!
SensePost, an elite ethical hacking team of Orange Cyberdefense have been training at BlackHat since 2002. We pride ourselves on ensuring our content, our training environment and trainers are all epic in every way possible. The trainers you will meet are working penetration testers, responsible for numerous tools, talks and 0day releases. This provides you with real experiences from the field along with actual practitioners who will be able to support you in a wide range of real-world security discussions. We have years of experience building environments and labs tailored for learning, after all education is at the core of SensePost and Orange Cyberdefense.
Twitter: @sensepost_train
LinkedIn: https://www.linkedin.com/showcase/sense-post