Cyber Warfare
R11,999.00
This training is an advanced course that covers topics in the Red-Team Cyber Warfare methodologies. The participants will get an in-depth look into the mind of a Black-Hat hacker. The training includes defense and offense and takes a deep dive into its practical world using the CYBERIUM ARENA simulator. Students will learn the different information-gathering tools and security bypassing products that can be leveraged to attack against every layer of defense.
Duration: 40 Hours
Target Audience
- IT Professionals and Organizations that would like to embrace Red-Team’s capabilities
Pre-requisites
- ThinkCyber Level-2 Courses
Objectives
- Acquiring the knowledge and tools to become better Red-Team member
- Becoming familiar with a variety of available tools for performing security-related tasks
- Becoming familiar with a variety of attack scenarios
- Understanding different attack possibilities
- Using automation as a Red-Team member
Description
Module 1: Red-Team Target Discovery
In this module, students will learn to act as Red-Team while attempting to gain information about the target using brute-force, craft discovery tools, fingerprinting websites. Furthermore, students will learn to use social engineering skills to trick the target into revealing information and their location.
- Advanced Web-Discovery
o DNS Bruting - Amass
- Sublist3r
- aiodnsbrute
o Passive Discovery - awesome-osint
- ShodanHat
- LinkedInt
o Crafting Discovery Tools in Bash
o Using recursebuster
o Cloud AWS S3 Buckets using inSp3ctor
o Fingerprinting Web Applications - BlindElephant
- Red-Team Banner Grabbing
- Firewall Detection using wafw00f
- Gaining Information about the Target
o Advanced Social Engineering Techniques
o The Browser Exploitation Framework (BeEF)
o Tracking user Locations using Google API
o Enumerating Services - Extracting Users from SAMBA
- NetBIOS
- RPCClent
o Vulnerability Detection and CVE identifying
o Shodan CLI
o Maltego Teeth
Module 2: Exploiting and Attacking
This module is all about gaining access at any cost. Students will learn to build a password list for brute-force wordlist attacks, preform advanced fuzzing, and finally automate the attacks. Also, students will practice advanced Red-Team attacks over the network using various specialized tools.
- Gaining Access
o Creating Password Lists - Wordhound
- Brutescrape
- Gitrob
- CUPP
- Crunch
o Online Brute-Force to Gain Access - SSH Bruting using Hydra
- Burpsuite Intruder
- RDP Cracking using Crowbar
o Fuzzing - Application Fuzzing
- Protocol Fuzzing
- File Format Fuzzing
- Fuzzers Advantages and Limitations
o Crafting Malware from Source using The-ZOO
o Automating the Attack - Advanced Features of Metasploit
- Crafting Scapy Tools
- Forging RC Scripts
- Automating Empire’s API using DeathStar
- Network Attacks
o Exposed Printers Abuse
o Advanced MiTM Techniques for Red-Teams - Using the DHCP Protocol to Gain MiTM Status
- DNS Proxy Crafting using DNSChef and MiTMProxy
o Catching LLMNR and NBT-NS Credentials using Responder
o DHCP Starvation Usages and Advantages
o Flooding SIP and SDP Invite Protocol using inviteflood
o Advanced DDoS using UFONET-Framework
o Paralyzing Windows Hosts using Default Services
Module 3: Escalating Privileges and Maintaining Access
During this module, students will learn a variety of methods to gain higher access to the exposed target, such as offline brute-forcing, disabling the SSL function, spying over VoIP and WSL, and more.
- Escalating Privileges
o Using Meterpreter for Privilege Escalation
o Gaining Passwords Using Offline Brute-Force - John The Ripper
- Cain and Abel
- L0phtCrack
- DaveGrohl
o Privilege Escalation using Vulnerable Services
o Uncovering Hidden Credentials on Windows Server using BloodHound
o Seemless SSL-Striping
o Intercepting and Abusing WSL Service
o Spying on IP-Phones using VoIP-Hopper and ohrwurm
o Red-Team NSE User Enumeration
o Windows and Linux Exploit-Suggesters - Maintaining Persistence
o Crafting Backdoors - Msfvenom
- Nishang
o Firewall, IDS and Honeypot Evasion Techniques - Recompiling the Backdoors
- Forging Tunnels using the HTTPTunnel Tool
- Using SSH to Hide Backdoor Traffic
- Using Automater to Identify Honeypots
o Linux Rootkits for Red Teams - Linux Boot Process
- Browsing the Kernel Code
- Accessing User Space Process Memory
- Understanding the Kernel Network Stack
Module 4: Surfing The Exposed Network
This module will demonstrate to the new Red-Team, the usage of advanced techniques to map the exposed network from the inside, and finally, gain control of the main components of the network.
- Mapping the Exposed Network
o Advanced Nmap Reports
o Abusing SQL Server Trust
o Trusted Features of PowerShell
o Finding Exposed Targets using CrackMapExec
o Querying Active Directory - Advanced ACL/ACE Bloodhound
- DNS Beacon
- Empire – Info Module
- Taking Over the Network
o Pass-the-Hash
o Harvesting Kerberos Tickets
o Abusing the DCOM application
o Empire – PSInject
o Building a Keylogger
o THP Red-Team Droppers
o Domain-Control Dump
o Advanced Linux Pivoting using mimipenguin