This course and associated labs will cover a range of technologies, languages, software, and services that a penetration tester may encounter while engaging various theoretical non-western organizations and the different challenges each may bring.
Most offensive-related cybersecurity courses today are tailored to focus on western Information Technology systems. Primarily, English-based software and systems running on-premise or hosted in cloud infrastructure, owned by western-based companies, residing within US or EU borders. This course has been designed for those charged with helping to secure non-western IT systems by way of penetration testing. This course and associated labs will cover a range of technologies, languages, software, and services that a penetration tester may encounter while engaging various theoretical non-western organizations and the different challenges each may bring. Most importantly, this course will provide you with the necessary mindset and flexible TTP’s to efficiently and effectively assess the security of any non-western IT infrastructure.
Syllabus
Introduction
Roll call
Workshop Overview
Rules
Labs
Range overview
How to access the range
Lab journey: Compromise Chinese and Russian partner business networks and exfil sensitive data
Operational Setup
Operator station overview
Operator environment
Operator tools
OPSEC considerations
Hostnames and usernames
Tooling OPSEC
OPSEC-safe LLM usage
Networking/Traffic obfuscation
Infrastructure and C2
Infrastructure theory
Picking the right C2 for the job
Infrastructure builds and scenarios
Infrastructure OSNIT and Recon Activities
Overview
Reviewing non-western threat reports for usable TTPs and environment clues
Looking out to see in: Why extensive OSINT and Recon improves post-exploitation success
AI Workflows and Automation
Setting up [n8n.io](http://n8n.io) for OSINT orchestration
Leveraging LLMs to parse or manipulate datasets
Automating data correlation and analysis
Non-Western Social Media Intelligence
Analyzing VK and other media platforms
Correlating users with organizational roles
Identifying security weaknesses through social engineering vectors
Creating actionable targeting scenarios
Scanning by Third-Party
Shodan
ZoomEye
Fofa
Ingress path identification
External Services Enumeration
Network mapping and services discovery
Subdomain enumeration
Certificate analysis and transparency search
Identifying and targeting users
Language and Translation Techniques
Translating websites and documents
OCR for Russian and Chinese RDP screens to extract non-Latin usernames
Initial Access and Persistence
Unique initial access methods for non-western systems
Firewall “Bending” for stealthy access
Establishing secure re-entry points
Persistence techniques
High up-time targets
Windows-specific persistence
Linux-specific persistence
Edge device persistence
Post-Exploitation
Helpful tradecraft tips
SOCKS proxies
Host Triage
Local enumeration techniques
Local privilege escalation evaluations
Targeting browser credentials
Network Triage
Internal network recon over C2 techniques
Identifying soft targets for lateral movement
Camera and CCTV enumeration
Credential Harvesting
Non-Active Directory password storage
Gathering password hashes
Cracking non-Latin passwords
Lateral Movement Techniques
Lateral movement in and out of Active Directory environments
The course is an **intermediate to advanced** level course designed to introduce new topics and techniques to both those new to offensive security and professionals alike. The course is structured to walk students through the different phases of an attack against multiple non-western enterprises while overcoming the challenges that these networks bring to ensure success for the operation.
Familiar with operating from a terminal interface or command line.
Familiar with using Linux and Windows environments.
Familiar with using a virtual machine environment.
A strong desire to learn exciting and unique offensive TTPs.
Students who may not have penetration testing experience may sit, absorb, and learn at their own pace as the labs and content are available to them after.
Students will learn from course materials, lectures, discussions, and hands-on labs that will be hosted with Antisyphon Training for continued use after the course ends. The labs are designed to take students on a journey through simulated Chinese and Russian partner business networks. Students will learn to perform unique OSINT leveraging visual AI workflows with [n8n.io](http://n8n.io) to orchestrate tasks and LLMs as a force-multiplication tool, enhancing the operator’s ability to parse through mounds of data, identify ingress points, correlate security weaknesses with users and their roles in the target organization by scraping VK and other .ru media, and utilize it all to rapidly create and prioritize actionable targeting scenarios. Students will operate against both Chinese and Russian-language simulated environments, demonstrating flexibility as technologies and languages may differ at various points in the labs. Students will learn how to translate websites, documents, quickly research “new to us” technologies, use OCR against Russian and Chinese RDP screens to extract non-Latin usernames, and more into actionable intelligence. Students will learn and practice the art of gaining initial access in unique ways while ensuring they can re-enter the system securely and persistently. Students will utilize a combination of OSINT information and network reconnaissance TTPs to quietly enumerate and jump laterally across network segments to their next targets. Students will learn how non-Active Directory systems store passwords, gather, and crack non-Latin password hashes to aid the attack deeper into the LAB network. Finally, students will hunt for and extract sensitive information from the network showing impact to the operation.
Steve Borosh is a proud U.S. Army Infantry veteran and security consultant at Black Hills Information Security. Steve has extensive experience as a penetration tester, red team operator, and instructor since 2014. Steve has instructed courses on penetration testing and red teaming for the public, private, and federal law enforcement sectors. Steve also has experience teaching and speaking at conferences such as Blackhat, various BSides events, Gartner, and others. Steve maintains a blog and GitHub repository to share knowledge and open-source offensive tools with the community. Steve earned a B.S. in Computer and Information Science from ECPI University.
This class is being taught at BSides Prague in Czechia – Click here to learn more
April 21st 9am CET – April 22nd 6pm CET.