Il corso tratta argomenti strettamente correlati al mondo reale e i laboratori sono studiati per garantire una elevata somiglianza alle reti reali che si trovano durante le attività di Red Teaming, compresi host con a bordo software Antivirus.
Professional IT
Buona conoscenza dei protocolli di rete, familiarità nell’uso dei sistemi operativi windows e linux, conoscenza di base delle tecniche di ethical hacking (consigliata frequenza corso CEH o GPEN o conoscenza equivalente).
DAY 1 Red Team Basic and Collaboration
- Red Team Operations Management
- Real-world adversarial tactics, techniques and procedures (TTPs)
- OSINT
- Collaboration, lab with Metasploit, Burp-suite, ecc
- Offense-in-Depth
DAY 2 Techniques
- Perform scans
- Perform safety, VA and PT tests.
- System Profiling and Gaining Covert Access
- Metasploit advanced and Armitage – Server side
- Techniques and exploit Client side
DAY 3 Situational Awareness e privilege escalation
- Trojan e backdoor
- Web Attack Basics
- Web attack OWASP
- Privilege escalation
- Escalation of Access
DAY 4 Advanced Lateral Movement, Truste Abuse
- Techniques e pivoting
- Advanced Lateral Movement, Trust Abuse
- Crack password
- Post-Exploitation
DAY 5 Persistence and data exfiltration
- Long-term persistence
- Data exfiltration through networks with proxies
- Firewalls Analysis of attacks and possibility of evasion
- Blue Team Training