Tuesday, 23. April 2019, Hyatt Regency Tysons Corner, Adversary Tactics - Red Team Operations Training Course - D.C. April 2019

Upgrade your Red Team engagements with bleeding-edge Tactics, Techniques, and Procedures (TTPs) used by attackers in real-world breaches. This course will teach students how to infiltrate networks, gather intelligence, and covertly persist in a network like an advanced adversary. Students will use the skillsets taught in Adversary Tactics: Red Team Ops to go up against live incident responders in an enterprise lab environment designed to mimic a ****** real-world network. Students will learn to adapt and overcome Blue Team response through collaborative feedback as the course progresses.
Topics covered include:

Design and deploy sophisticated, resilient covert attack infrastructure
Gain an initial access foothold on systems using client-side attacks in real-world scenarios
Utilize advanced Active Directory attack techniques to execute domain enumeration, escalation, and persistence
Perform sophisticated post-exploitation actions, including sophisticated data mining, going beyond just achieving “Domain Admin”
Use cutting-edge lateral movement methods to move through the enterprise
Practice “offense-in-depth” by utilizing a variety of tools and techniques in response to defender actions and technical defenses
Effectively train network defenders to better protect themselves against advanced, persistent adversaries

Course Summary

As organizations scramble for a way to keep from becoming the next breach headline, they’ve begun looking for ways to simulate the sophisticated attackers they now ****. Organizations that have started to adopt an “assume breach” mentality understand that it’s not a matter of if they’re compromised by these advanced adversaries, but when. The best way to test modern environments against these more advanced threats is with a Red Team that leverages the same TTPs as adversaries themselves. If you want to learn how to perform Red Team operations, sharpen your technical skillset, or understand how to defend against modern adversary tradecraft, Adversary Tactics: Red Team Ops is the course for you.
This intensive course immerses students in a simulated enterprise environment, with multiple domains, up-to-date and patched operating systems, modern defenses, and active network defenders responding to Red Team activities. We will cover all phases of a Red Team engagement in depth: advanced attack infrastructure setup and maintenance, user profiling and phishing, host enumeration and “safety checks”, advanced lateral movement, sophisticated Active Directory domain enumeration and escalation, persistence (userland, elevated, and domain flavors), advanced Kerberos attacks, data mining, and exfiltration.
A focus will be placed on “offense-in-depth,” the ability to rapidly adapt to defensive mitigations and responses with a variety of offensive tactics and techniques. To drive this concept home, students will go up against live incident responders that will actively hunt for and block malicious activity in the environment. The responders will provide real-time feedback to students to demonstrate what artifacts attackers can leave behind, and how students can adapt their tradecraft to minimize their footprint. Come learn to use some of the most well-known offensive tools from the authors themselves, including co-creators and developers of PowerView, PowerShell Empire, PowerSploit, PowerUp, and BloodHound.
Course Syllabus
Day 1:

Red Team philosophy/overviewEngagement management
Covert infrastructure deep dive - setup, protection, maintenance
Initial external reconnaissance and OSINT
“Offense-in-depth”
Evading network detections and active incident responders (“hunting”)

Day 2:

Initial access
Host triage and offensive “safety checks”
Detection and evasion of host-based defenses
Maintaining your foothold (short vs. long term and userland vs elevated persistence strategies)
Privilege escalation methods through abuse of misconfigurations

Day 3:

User and network resource mining
Credential abuse
Active Directory enumeration and abuse - intelligence gathering, domain escalation, covert persistence, and BloodHound
Kerberos attacks in depth
Pivoting through the target network

Day 4:

Providing value to client
Blue team training objectives
Data movement and external exfiltration
Lab debrief

Student Requirements
This is an advanced course and will include a large amount of lab activities in a complex simulated enterprise, with active response actions being taken by defensive personnel. Students should have previous penetration testing training and experience with penetration testing tools and techniques. It is also strongly encouraged that students be familiar with Cobalt Strike, which is the platform used in the course. Additionally, some familiarity with PowerShell or other scripting languages is beneficial.
Hardware Requirements
The course lab is accessed through a browser with connectivity to the internet. Participants will need to bring a laptop with a browser that can connect to a publicly routed Apache Guacamole instance over ports 80/443.
What's Included

Four day training
All day beverages and snacks
Daily lunch
Happy hour with the instructors

Accommodations
Training will be taking place in the Hyatt Regency Tysons Corner in McLean, Virginia
FAQs

How can I contact the organizer with any questions?
Please email info@specterops.io with any questions.  
What's the refund policy?
Full refunds will be provided up to 7 days before the course start date.
 

Adversary Tactics - Red Team Operations Training Course - D.C. April 2019

Find more events around you
Get event recommendations based on your Facebook taste. Get it now!Show me the suitable events for meNot now