To conduct an advanced attack, you need more than just a collection of simple scripts. In addition to talent, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement, the more time we need. Time is something we don’t have a lot of on an engagement.
Today, to be an advanced and effective attacker, you need to move fast, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources, the days of manual setup are long behind us.
Where do we get started? And how does it all work?
In this training, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share.
In this class, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly, we will work through multiple labs and examples that you can take with you for your next engagement.
After having taken this course, students should have:
- A thorough understanding of advanced attack infrastructure
- A full methodology for building red team resources
- Instructions and sample code on how to build out full attack infrastructure and how to integrate TTPs.
WHO SHOULD TAKE THIS COURSE
- Penetration testers
- Red teamers
- Ethical hackers
- General security practitioners
AUDIENCE SKILL LEVEL
There is no particular skill level necessary to take this course.
Students should have general Windows / UNIX command line skills in order to complete all of the hands-on labs.
WHAT EACH STUDENT SHOULD BRING
- A credit card (You will be signing up for cloud service accounts such as Microsoft Azure and AWS. These services require a credit card for signing up.)
- Before registering, please check that both Amazon AWS and Microsoft Azure services are available in your country. (Note that if you cannot sign up for these services you will not be able to participate in the labs)
- A computer with:
- x86-compatible or x64-compatible 2.0 GHz CPU minimum or higher
- 8 GB RAM or higher required
- 40 GB available hard drive space
- Windows 10 (This training utilizes VMware Workstation Player to run two different VMs)
- Internet access
WHAT STUDENTS WILL BE PROVIDED WITH
Links to all the material and tools needed with instructions. Access to two private class channels on our Discord server.
TRAINER & AUTHOR
Ralph May is a security analyst and penetration tester at Black Hills Information Security. Before joining BHIS, Ralph spent the last five years delivering penetration tests on a wide range of security assessments. These assessments include physical, wireless, network, social engineering, and full simulation red teams. Before focusing on security, Ralph worked as a system administrator and as a network engineer for both civilian and government employers. Ralph is a US Army veteran who previously worked with the United States Special Operations Command (USSOC) on information security challenges and threat actor simulations.
Ralph has contributed to multiple open-source security tools and spoken at numerous security conferences. He’s a lifelong learner and finds joy in discovering how technology truly works. When Ralph is away from the keyboard, he likes the outdoors, boating, exercising, and spending time with his family.
Tues, June 27, 2022 11:00 AM – 4:00 PM ET
Wed, June 28, 2022 12:00 PM – 4:00 PM ET
Thu, June 29, 2022 12:00 PM – 4:00 PM ET
Fri, June 30, 2022 12:00 PM – 4:00 PM ET