Description
TCM Security Movement, Pivoting, and Persistence (2024)
Movement Pivoting Persistence Course Overview
This advanced Movement Pivoting Persistence Course is designed for penetration testers and ethical hackers looking to expand their skills in navigating and compromising networks, particularly during remote engagements. The focus is on techniques for moving within a target network, establishing persistence, and pivoting to new systems after gaining an initial foothold.
Key Topics Covered:
- Username and Password List Generation: Learn how to create and use effective lists for brute force or password spraying attacks.
- Password Spraying: Techniques for systematically testing common passwords across many accounts to avoid detection.
- Email Phishing: Craft and deliver phishing attacks aimed at gathering credentials or compromising systems.
- Command and Control (C2): Set up and use C2 servers to maintain access and control over compromised systems.
- Credential Harvesting and Passing: Capture and reuse credentials for lateral movement within the network.
- Routing, Port Forwarding, SOCKS Proxies, and Bind Usage: Advanced networking techniques to move traffic through compromised systems and extend your reach within the network.
- Offensive PowerShell: Use PowerShell to execute payloads, gather data, and maintain access on Windows systems.
- Misconfigurations in Real Pentests: Learn how common misconfigurations, such as weak access controls and improperly segmented networks, allow attackers to escalate privileges and pivot.
- Common Remediation Strategies: Discover actionable remediation strategies to provide to clients, helping them patch vulnerabilities and improve security postures.
Course Structure:
The course combines theoretical lessons with hands-on exercises, allowing students to practice in simulated environments. You’ll develop skills in lateral movement, pivoting, and persistence, which are critical to compromising deeper systems within a network after an initial breach.
Who Should Take This Course?
This course is aimed at intermediate to advanced penetration testers and ethical hackers who are comfortable with basic hacking methodologies and are looking to enhance their skills in remote access, network navigation, and maintaining persistence. It is also valuable for security professionals who want to better understand how attackers move through networks, so they can implement more effective defenses.
By the end of the course, participants will be equipped to perform more advanced penetration testing engagements and offer valuable insights and remediation recommendations to clients.
Discover more from Expert Training
Subscribe to get the latest posts sent to your email.
Reviews
There are no reviews yet.