PowerShell for Penetration Testers



Similar documents
Kautilya: Teensy beyond shells

Hacking Classes 75% 75% Hands-on Learning in Our Modern Hack Lab. Written by BlackHat Trainers: Available Globally

OPAS Prerequisites. Prepared By: This document contains the prerequisites and requirements for setting up OPAS.

Audience. Pre-Requisites

Microsoft Windows PowerShell v2 For Administrators

Penetration Testing with Kali Linux

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Learn Ethical Hacking, Become a Pentester

PowerShell. It s time to own. David Kennedy (ReL1K) Josh Kelley (Winfang) Twitter: dave_rel1k

How We're Getting Creamed

Defcon 20 Owning One To Rule Them All. Dave DeSimone Manager, Information Security Fortune 1000

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Vulnerability Assessment and Penetration Testing

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

How To Use Powerhell For Security Research

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Open Source Toolkit. Penetration Tester's. Jeremy Faircloth. Third Edition. Fryer, Neil. Technical Editor SYNGRESS. Syngrcss is an imprint of Elsevier

Contents Introduction... 3 Introduction to Active Directory Services... 4 Installing and Configuring Active Directory Services...

Exploiting Transparent User Identification Systems

CRYPTUS DIPLOMA IN IT SECURITY

Hosts HARDENING WINDOWS NETWORKS TRAINING

50331D Windows 7, Enterprise Desktop Support Technician (Windows 10 Curriculum)

Post Exploitation. n00bpentesting.com

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 616 Securing Windows Infrastructure. Make The Difference CAST.

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security Sans Mentor: Daryl Fallin

Lab 7 - Exploitation 1. NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy

Outline SSS Microsoft Windows Server 2008 Hyper-V Virtualization

Penetration Testing Walkthrough

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

TAKING SECURITY TESTING TO THE NEXT LEVEL 5 MAY 2014 STAN HEGT

Penetration Testing - a way for improving our cyber security

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days)

Course Syllabus. Implementing and Managing Windows Server 2008 Hyper-V. Key Data. Audience. At Course Completion. Prerequisites

Penetration Testing Using The Kill Chain Methodology

Metasploit ing the target machine is a fascinating subject to all security professionals. The rich list of exploit codes and other handy modules of

Automation of Post-Exploitation

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

1. Why is the customer having the penetration test performed against their environment?

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

CIT 480: Securing Computer Systems. Vulnerability Scanning and Exploitation Frameworks

EC-Council Certified Security Analyst (ECSA)

Agenda. Red Team Difference to a Pen Test Common RT Techniques Blue Team

Internal Penetration Test

Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes

FORENSIC ARTIFACTS FROM A PASS THE HASH (PTH) ATTACK BY: GERARD LAYGUI

Windows 7, Enterprise Desktop Support Technician

Hackers are here. Where are you?

Certified Ethical Hacker (CEH)

Automating Microsoft

Training module 2 Installing VMware View

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing LAB Setup Guide

A New Era. A New Edge. Phishing within your company

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

Good Morning Wireless! SSID: MSFTOPEN No Username or Password Required

All Information is derived from Mandiant consulting in a non-classified environment.

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Installing and Configuring Active Directory Agent

InfoSec Academy Pen Testing & Hacking Track

CYBERTRON NETWORK SOLUTIONS

Implementing and Managing Windows Server 2008 Hyper-V

Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Ethical Hacking & Cyber Security Workshop

Protecting Your Organisation from Targeted Cyber Intrusion

Network Architecture & Active Directory Considerations for the PI System. Bryan Owen - OSIsoft Joel Langill - SCADAhacker

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

WHY ATTACKER TOOLSETS DO WHAT THEY DO

Hands-on Hacking Unlimited

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Who DIT It? Detecting and Mitigating Privilege Escalation Attacks on the Active Directory Data Store

Preparing an IIS Server for EmpowerID installation

Pentesting for fun... and profit! David M. N. Bryan and Rob Havelt

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

Metasploit: Penetration Testing in a Virtual Environment. (Final Draft) Christopher Steiner. Dr. Janusz Zalewski. CNT 4104 Fall 2011 Networks

INFORMATION SECURITY TRAINING CATALOG (2015)

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Post-Access Cyber Defense

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

Penetration Test Report

The Nexpose Expert System

Installing and Configuring Windows Server 2012

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008

Using Nessus In Web Application Vulnerability Assessments

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification

Intelligence Gathering. n00bpentesting.com

About Effective Penetration Testing Methodology

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Transcription:

Training: PowerShell for Penetration Testers Dates of the training: March 14-15,2016 in Heidelberg, Germany Book Now using the code: TR16HMTRAINING and save an additional 10% of the current valid rate! Overview PowerShell has changed the way Windows networks are attacked. It is Microsoft s shell and scripting language available by default in all modern Windows computers. It could interact with.net, WMI, COM, Windows API, Registry and other computers on a Windows network. This makes it imperative for Penetration Testers and Red Teamers to learn PowerShell. This training is aimed towards attacking Windows network using PowerShell and is based on real world penetration tests done by the instructor. The course runs as a penetration test of a secure environment with detailed discussion and use of custom PowerShell scripts in each phase. Some of the techniques (see the course content for details), implemented using PowerShell, used in the course: In-memory shellcode execution using client side attacks. Exploiting SQL Servers (more than executing commands) Using Metasploit payloads with no detection Active Directory trust mapping, abuse and Kerberos attacks. Dump Windows passwords, Web passwords, Wireless keys, LSA Secrets and other system secrets in plain text Using DNS, HTTPS, Gmail etc. as communication channels for shell access and exfiltration. Network relays, port forwarding and pivots to other machines.

Reboot and Event persistence Bypass security controls like Firewalls, HIPS and Anti-Virus. The course is a mixture of demonstrations, exercises, hands-on and lecture. The course also has a live CTF which attendees could try with and after the training. Course Content Introduction to PowerShell Language Essentials Using ISE Help system Syntax of cmdlets and other commands Variables, Operators, Types, Output Formatting Conditional and Loop Statements Functions Modules PowerShell Remoting and Jobs Writing simple PowerShell scripts Extending PowerShell with.net WMI with PowerShell Playing with the Windows Registry COM Objects with PowerShell Recon, Information Gathering and the likes Vulnerability Scanning and Analysis Exploitation Getting a foothold Exploiting MSSQL Servers Client Side Attacks with PowerShell PowerShell with Human Interface Devices Writing shells in PowerShell Using Metasploit and PowerShell together Porting Exploits to PowerShell

Post-Exploitation What PowerShell is actually made for Enumeration and Information Gathering Privilege Escalation Dumping System and Domain Secrets Kerberos attacks (Golden, Silver Tickets and more) Backdoors Pivoting to other machines Poshing the hashes Replaying credentials Network Relays and Port Forwarding Achieving Persistence Clearing Tracks Quick System Audits with PowerShell Detecting PowerShell attacks Security controls available with PowerShell What Would the Attendees Gain? PowerShell Hacker s Cheat Sheet, access to the online CTF, solutions to exercises, sample source code, Lab manual, Lab machines (VM), updated tools and extra slides explaining things which could not be covered. The attendees would learn a powerful attack method which could be applied from day one after the training. The attendees would understand that it is not always required to use a third party tool or non-native code on the target machine for post exploitation. The attendees would learn how PowerShell makes things easier than previous scripting options on Windows like VB. Attendees would be able to write own scripts and customize existing ones for security testing after this training. This training aims to change how you test a Windows based environment.

PREREQUISITES: Basic understanding of how penetration tests are done. Basic understanding of a programming or scripting language could be helpful but is not mandatory. An open mind. SYSTEM REQUIREMENTS: A Windows 7 or later system with 4 GB RAM, with Administrative access and ability to run PowerShell scripts. Ability to run VMware virtual machines. About Your Trainer: Nikhil Mittal He is a hacker, infosec researcher, speaker and enthusiast. His area of interest includes penetration testing, attack research, defence strategies and post exploitation research. He has 6+ years of experience in Penetration Testing for his clients which include many global corporate giants. He is also a member of Red teams of selected clients. He specializes in assessing security risks at secure environments which require novel attack vectors and "out of the box" approach. He has worked extensively on using Human Interface Device in Penetration Tests and PowerShell for post exploitation. He is creator of Kautilya, a toolkit which makes it easy to use HIDs in penetration tests and Nishang, a post exploitation framework in PowerShell. In his spare time, Nikhil researches on new attack methodologies and updates his tools and frameworks. Nikhil has held trainings and boot camps for various corporate clients (in US, Europe and SE Asia), and at the world s top information security conferences. He has spoken at conferences like Defcon, BlackHat USA, BlackHat Europe, RSA China, Troopers, DeepSec, PHDays, BlackHat Abu Dhabi, Hackfest, ClubHack, EuSecWest and more. He blogs at http://www.labofapenetrationtester.com/

Booking Recommended Online Booking of Trainings Through: Sign-Up Form https://www.troopers.de Booking code: TR16HMTRAINING Using this booking code automatically gives you an additional 10% off the current valid price! You can register with this code up until March 13 th, 2016. Contact TROOPERS ORGANIZATION TEAM Need assistance? +49 6221 480390 Zögern Sie nicht uns zu kontaktieren. Wir sprechen fließend Englisch und Deutsch. Booking is also possible offline through your trusted partner from: HM Training Solutions, Falkenstrasse 6,63820 Elsenfeld, Germany +49 6022 508200 +49 6022 5089999 www.hmtrainingsolutions.com