- This event has passed.
Red Team Initial Access w/ Michael Allen
June 24 @ 11:00 am – June 27 @ 4:00 pm EDT
Instructor: Michael Allen
Course Length: 16 Hours
Includes: Twelve months of complimentary access to the Antisyphon Cyber Range, certificate of participation, six months access to class recordings.
Class Dates | Class Times |
---|---|
Monday, June 24th, 2024: | 11:00 AM – 4:00 PM ET |
Tuesday, June 25th, 2024: | 12:00 PM – 4:00 PM ET |
Wednesday, June 26th, 2024: | 12:00 PM – 4:00 PM ET |
Thursday, June 27th, 2024: | 12:00 PM – 4:00 PM ET |
Clicking on this button will take you to our registration form
Pricing:
Course Description
This new course has been completely rebuilt from the ground up to reflect modern initial access methods that work in 2024!
Getting a foothold is the first step in a successful breach—and due to modern defenses, it is often the most difficult. In this class, students will learn to execute the most effective and up-to-date methods for breaching a modern enterprise environment and obtaining initial access.
Who Should Take This Course
- Red teamers who are frustrated with traditional initial access attacks or who want to add more techniques to their toolbox.
- Aspiring penetration testers and red teamers who want to quickly learn the latest and greatest attacks that we use on the job every day.
- Blue teams and other defenders who want to understand how to defend modern cyber-attacks and how to easily test their own prevention and monitoring capabilities.
- Managers of either offensive or defensive security teams, seeking to keep their technical knowledge up to date.
- Anyone with an interest in cyber security.
Key Takeaways
After completing this class, you will be able to:
- Perform rapid, attack-focused reconnaissance of a target organization.
- Find and leverage data leaks on the internet.
- Conduct effective credential stuffing and password guessing attacks.
- Leverage multiple techniques to overcome multi-factor authentication (MFA).
- Execute social engineering attacks over conventional and unconventional channels.
- Obtain access through illicit consent grant attacks (aka “Device Code” phishing).
- Execute Adversary-in-the-Middle attacks for credential theft and session hijacking.
- Bypass endpoint defenses to achieve payload execution.
You will also learn:
- How operating outside the “Cyber Kill Chain” minimizes detection and multiplies the chances of a successful attack.
- How to properly vet attacks before execution, to ensure the maximum chance of success.
- Targets that are impossible for organizations to defend or monitor.
- Fundamental principles to maximize the effectiveness of social engineering attacks.
Student Requirements
The following prerequisites are recommended for students to successfully participate in and complete the lab exercises:
- Students should know how to install and run a VMware virtual machine on the computer they use for class.
What Each Student Should Bring
Students will need to have the following resources to participate in the lab exercises in class:
- A modern x64 computer with VMware Workstation Player, Workstation Pro, or Fusion virtualization software installed.
- Note that due to the x64 processor requirement, computers with Apple M1/M2 processors are not supported.
- User permissions to install and run a Windows 11 x64 virtual machine in their virtualization platform. The following minimum hardware resources are required to run the virtual machine:
- 70 GB of available hard disk space
- 8 GB of RAM
- High-speed Internet sufficient for participating in a video conference/webinar.
- A credit card – Students need to sign up for cloud service accounts such as Microsoft 365, Azure, and Amazon AWS. These services offer free trials, which can be used for the lab exercises, but a credit card is required for signing up.
- A mobile phone – Students may need to receive SMS messages to complete signups for cloud service accounts. Students will also require a mobile phone for multi-factor authentication during the labs.
If you are not sure if your computer meets the hardware or virtualization requirements noted above, you can test your computer before purchasing the class by downloading and installing Microsoft’s official VMware Windows 11 image at the following URL. If you can run this VMware virtual machine on your computer, you will also be able to run the virtual machine provided for class.
- Note that the virtual machine available at this link is not the same one you will be using in class. It is provided here only for testing your computer before purchasing the class.
- https://developer.microsoft.com/en-us/windows/downloads/virtual-machines/
Instructor
After years of hacking “just for fun,” Michael Allen turned his hobby into a career and began penetration testing professionally in 2014. Since then, he has also spent time teaching courses a Black Hat USA and earned a multitude of infosec certifications, including the OSCE, MLSE, and CISSP, among others. He joined the BHIS team in 2019 where he is proud to work alongside some of the best and brightest infosec professionals in the world today.