Red Team Initial Access w/ Michael Allen
June 24 @ 11:00 am – June 27 @ 4:00 pm EDT
Instructor: Michael Allen
Course Length: 16 Hours
Includes: Twelve months of complimentary access to the Antisyphon Cyber Range, certificate of participation, six months access to class recordings.
Class Dates | Class Times |
---|---|
Monday, June 24th, 2024: | 11:00 AM – 4:00 PM ET |
Tuesday, June 25th, 2024: | 12:00 PM – 4:00 PM ET |
Wednesday, June 26th, 2024: | 12:00 PM – 4:00 PM ET |
Thursday, June 27th, 2024: | 12:00 PM – 4:00 PM ET |
Clicking on this button will take you to our registration form
Pricing:
Course Description
This new course has been completely rebuilt from the ground up to reflect modern initial access methods that work in 2024!
Getting a foothold is the first step in a successful breach—and due to modern defenses, it is often the most difficult. In this class, students will learn to execute the most effective and up-to-date methods for breaching a modern enterprise environment and obtaining initial access.
Who Should Take This Course
- Red teamers who are frustrated with traditional initial access attacks or who want to add more techniques to their toolbox.
- Aspiring penetration testers and red teamers who want to quickly learn the latest and greatest attacks that we use on the job every day.
- Blue teams and other defenders who want to understand how to defend modern cyber-attacks and how to easily test their own prevention and monitoring capabilities.
- Managers of either offensive or defensive security teams, seeking to keep their technical knowledge up to date.
- Anyone with an interest in cyber security.
Key Takeaways
After completing this class, you will be able to:
- Perform rapid, attack-focused reconnaissance of a target organization.
- Find and leverage data leaks on the internet.
- Conduct effective credential stuffing and password guessing attacks.
- Leverage multiple techniques to overcome multi-factor authentication (MFA).
- Execute social engineering attacks over conventional and unconventional channels.
- Obtain access through illicit consent grant attacks (aka “Device Code” phishing).
- Execute Adversary-in-the-Middle attacks for credential theft and session hijacking.
- Bypass endpoint defenses to achieve payload execution.
You will also learn:
- How operating outside the “Cyber Kill Chain” minimizes detection and multiplies the chances of a successful attack.
- How to properly vet attacks before execution, to ensure the maximum chance of success.
- Targets that are impossible for organizations to defend or monitor.
- Fundamental principles to maximize the effectiveness of social engineering attacks.
Instructor
After years of hacking “just for fun,” Michael Allen turned his hobby into a career and began penetration testing professionally in 2014. Since then, he has also spent time teaching courses a Black Hat USA and earned a multitude of infosec certifications, including the OSCE, MLSE, and CISSP, among others. He joined the BHIS team in 2019 where he is proud to work alongside some of the best and brightest infosec professionals in the world today.