קורסים מקצועיים למתקדמים

ZX OFFENSIVE

PE304: Post Exploitation

מספר הקורס 71579

למה ללמוד בג'ון ברייס?
  • למידה חדשנית ודינמית עם כלים מתקדמים בשילוב סימולציות, תרגול וסביבות מעבדה
  • מגוון הכשרות טכנולוגיות עם תכנים המותאמים להתפתחות הטכנולוגית ולביקוש בתעשיית ההייטק
  • מובילים את תחום ההכשרות לעולם ההייטק והטכנולוגיה כבר 30 שנה, עם קהילה של עשרות אלפי בוגרים
  • אתם בוחרים איך ללמוד: פרונטאלית בכיתה, מרחוק ב- Live Class או בלמידה עצמית

המועדים הקרובים

קורס לקבוצות

הקורס נפתח במתכונת של קבוצה בלבד, בהתאמה אישית לארגונים.
לפרטים נוספים: Muzman@johnbryce.co.il

ניתן לפתוח את הקורס בהתאמה אישית ומלאה לצרכי הארגון, במועדים ומערכי לימוד גמישים בשילוב תכנים ייעודים.

משך הקורס

שעות אקדמיות:

40

מספר מפגשים:

קורס בוקר:

5

מספר מפגשים:

קורס בוקר:

5

מתכונת הקורס

הקורסים המוזמנים לארגונים מותאמים באופן אישי ומלא לצרכי הארגון, מערכי הלימוד גמישים וניתן לשלב בהם תכנים רלוונטיים וייעודיים.

Overview

The goal of Post Exploitation is to determine the value of the machine by collecting the data that stored in, the value of the machine determined by the sensitivity of this data. We will learn how to identify and document this data, configuration settings and communication channels with other devices.

Objectives

Gathering information from different operating systems

Inject files to remote operating systems

Privilege Escalation

Creating backdoors

Gathering information from networks

Infect users and servers

Retrieve sensitive data

Covering tracks

Who Should Attend

Security practitioners

Penetration testers

Ethical hackers

Private companies

Individuals with previous background

תכנית הלימודים

Full syllabus
PDF להורדה

Module 1: Information Gathering

In this module we will learn how to gather information from different operating systems, we will see techniques that help us cover our track, we will use commands and systems that help us to maintain our access to the target machine and make use in related tools. Also, we learn how to use scripts to manipulate the target operating system.

  • Network Recon
    • ARP table
    • Broadcast
    • Nmap
    • Ports Scans
    • Host Scans
    • Nessus
  • Windows
    • Blind File Systems
    • Networking
    • User Accounts (Users & Groups)
    • Finding Important Files
    • Remote System Access
    • Auto-Start Directories
    • WMI
    • Reg Command
    • Deleting Logs
    • Uninstalling Software’s (Anti-Virus & more)
    • Invasion or Alerting Commands
    • Meterpreter Commands
    • Meterpreter Scripts
    • PowerShell Scrips (Powerpreter)
  • Linux/Unix
    • Blind Files
    • System
    • Networking
    • User Accounts (Users & Groups)
    • Credentials
    • Installed Packages
    • Package Sources
    • Finding Important Files
    • Deleting Logs

 

Module 2: Working with files and permissions

In this module we will learn how deal with files that exists in the target device, how to evade an Anti-Virus when we upload files. We will learn how to extract information and sensitive data from the target machine. Students will learn how to exploit the target machine in order to get permissions using privilege escalation techniques.

  • File Transferring (Tools & Payloads)
    • Download from CMD
    • Download from PowerShell
    • Download from Terminal
    • Extracting from CMD
    • Extracting from PowerShell
    • Extracting from Terminal
    • Anti-Virus Evasion
  • Privilege Escalation
    • Finding Vulnerabilities
    • Executing a Script
    • Local Exploits
    • Hash (SAM File) & Tokens
    • Process Injection
    • Sensitive Files in Sharing Folder
    • DLL Injection
    • Bypassing UAC

 

Module 3: Creating Backdoors

This module discusses on tools and knowledge that enable us to create backdoors for different operating systems so that we can return to the target machine later. We will learn how to move inside the network and get relevant information about the network and the devices inside.

  • Backdoor
    • Windows
    • Windows API
    • Linux/Unix
    • Metasploit
    • Trojans
  • Persistence
    • Meterpreter
    • Netcat
    • Handler

 

Module 4: Pivoting and Stealthy

In this module we will upgrade our capabilities in the network area and pivot our attack to other targets on the network. We will learn about tunneling and learn techniques to cover our tracks.

  • Pivot & MiTM
    • Local Port Forwarding
    • Remote Port Forwarding
    • Dynamic Port Forwarding
    • LLMNR Poising
    • Arp Spoof
    • SSL strip
    • Encryption and Decrypting Files
  • Anti-Forensic
    • Thinking Anonymous
    • Secure Log & Data Deletion
    • Overwriting Metadata
    • Preventing Data Creation

 

Prerequisites
  • Previous knowledge in penetration testing
סימולטור - Cyberium Arena

The courses at John Bryce Training allow you to gain experience with unique simulators and hands-on practice labs that include a variety of scenarios. Students are given the opportunity to put in practice what they have learned in order to retain all the relevant skills and information they were given throughout the course, this way upgrading their knowledge and expertise.

The simulator that is used in the hands on practice labs is The Cyberium system. This is an advanced cyber scenario simulator which has been developed by cyber experts who have been constantly involved in cyber training and in giving knowledge gaps solutions in the field of cyber. The simulator includes two main types of scenarios – educational and realistic.

Each educational scenario is focused on a different aspect of the course and simulates a specific aspect of the training topics. Each issue or topic taught in the course has a point exercise that allows the student to focus on it and deeply learn it.

The realistic scenarios simulate possible or past incidents related to Information Security. This includes everything from topics such as the Regulation of Cyber Systems to Attacks by Terrorist Hacker Organizations. These scenarios are broader than the educational exercises and require more of a systemic, strategic and comprehensive vision.

After each scenario, the system automatically generates detailed reports that serve as immediate feedback that allows the student and lecturer to measure the abilities, strengths, and weaknesses of the participant.

Schedule Appointment

Fill out the form below, and we will be in touch shortly.

לא הצלחנו לאתר את הטופס.

בודק...