Master PowerShell hacking techniques and defend your enterprise with the Certified PowerShell Hacker course, designed for IT professionals aiming to strengthen security in AD environments.
EnrollUnderstand PowerShell-based attack vectors
Implement security measures against PowerShell threats
Develop real-world skills for penetration testing
Improve Active Directory infrastructure security
C)PSH-Certified PowerShell Hacker Duration: 4 Days CPEs: 32 $3,000 This course is an intense few days covering the keys to hacking with PowerShell. We know that most companies have an Active Directory infrastructure that manages authentication and authorization to most devices and objects within the organization. Many use PowerShell to speed up and simplify management, which only makes sense. Did you know that a large percentage of hacks over the last year included PowerShell based attacks? Well they did, which is why we spend 4 days learning how to hack like the pros using nothing but what is already available to us in Windows or now in open source code on Mac and Linux! The course is based on real world implementations of a windows infrastructure along with real world penetration testing techniques. You will leave with a real strong skill set to help test your windows environment like never before. An attendee will also walk away with a strong skill set on how to help prevent these attacks from happening in the first place! Here are just a few things you will take away from this course:
Different Tool Options
Installing everything needed
Language Basics
Using the Windows API and WMI
Interacting with the Registry
Managing Objects and COM Objects
Overview of Kerberos
The three-headed monster
Key Distribution Center
Kerberos in Detail
Why we care about Kerberos as a Hacker
Overview of Active Directory
Understanding AD concepts
AD Objects and Attributes
Introduction to the methodology
The Plan!!
Vulnerability Identification
Client-side attacks with and without PowerShell
What can a domain user see?
Domain Enumeration
Trust and Privileges Mapping
After the client exploit
Local Privilege Escalation
Credential Replay Attacks
Domain Privilege Escalation
Dumping System and Domain Secrets
PowerShell with Human Interface Devices
Kerberos attacks (Golden, Silver Tickets and more)
Delegation Issues
Attacks across Domain Trusts
Abusing Forest Trusts
Abusing SQL Server Trusts
Pivoting to other machines
Abusing Active Directory ACLs
Maintaining Persistence
Bypassing Defenses
Attacking Azure Active Directory
Defending an Active Directory Infrastructure
Detecting Attacks
Logging
Transcripts
Using Certificates
Using Bastion Hosts
Using AppLocker
Your team deserves training as unique as they are.
Let us tailor the course to your needs at no extra cost.
Trusted by Engineers at:
and more...
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier