Certified Red Team Specialist

Course OverView:

  • Perform Red Team Assessment in a Nuclear Facility
  • Perform Covert Operations to simulate Nuclear Meltdown
  • Follow Red Team Cycle in multi-segragated Networks
  • 3 Unique Paths are mapped with MITRE ATT&CK for Enterprise
  • Covered TTPs can be as-is implemeted during a Realistic Engagement
Enroll Now
product
  • 3 High-End
    Unique Attack Paths
  • VPN & Browser
    Based Lab Access
  • Realistic
    Enterprise Environment
  • Badge + Certificate
    Red Team Specialist

Introduction:

A Nation-State APT group is targeting a country’s Atomic Nuclear Facility, on the other hand the critical infrastructure security team is working hard to monitor & defend against the full-blown attack.

Our lab mimics an isolated environment of a Nuclear facility which generates electricity for a part of country. The reactivity designs of new generation reactors placed in the lab is an isolated unit with maximum safety & stability under mild conditions.

Course Highlights:

Practically Understand Red Team Methodology [OSINT to Exfil.]
Remote Access services exploitation
Bypass Host & Network Level Restrictions
Practical Understanding of Multi-Level Network Pivoting
Compromising an Isolated (air-gapped type) Network
Patched & Updated Linux, Windows OS in Active Directory Environment
3 Unique Attack Paths in Atomic Nuclear Lab
Technical Support

CRTS Enterprise Lab Highlights:

Extensive OSINT enumeration
Exploiting Remote Access Services (VDI, RDS servers etc.)
Abusing LOLBAS for Stealth Persistence
Breaking Docker Containers
Abusing SQL Servers
Practical Network Pivoting, Port Forwarding & Lateral Movement Scenarios
Exploiting widely used Enterprise Automation software Application
Advanced Kerberos Attacks

Syllabus Highlights:

Red Team Specialist Course is divided in to 5 main modules categorized below

Perform Cyber Kill Chain:

  • Extensive OSINT Enumeration
  • Exploit Remote Access Services (VDI, RDS etc)
  • Custom Privilege Escalation
  • Custom Web Exploitation
  • Abuse LOLABS to stealthily exfiltrate data
  • Follow MITRE ATT&CK Framework

Abuse Active Directory Environment:

  • Abuse Constrained & Unconstrained delegation
  • Kerberoasting and AS-REP Roasting
  • Credential Replay Attacks (PTH, OPTH, PTT etc)
  • Multiple Cross Forest Abuse Scenarios (FSP, Kerberoasting, Delegation)
  • Token Manipulation attacks
  • Abusing SQL Server Links from Linux Machines
  • Abuse Linux Machines in AD Environment

Escape Containerized Environment:

  • Multiple methods to escape containers
  • Simulated environment
  • Multi-Level Container Breakouts

Lateral Movement and Network Pivoting:

  • From Linux to Windows, Windows to Windows, Windows to Linux etc
  • Abuse Internal Remote Services in Multi-OS environment
  • Alternative authentication methodologies
  • Understand Local, Remote Port Forwarding, various proxies etc
  • Multi-level in-depth network pivoting in Windows & Linux OS

Enterprise grade automation software:

  • Abuse Automation Software
  • Abuse Secret Servers
  • Understand & Exploit CI/CD Pipeline
  • Custom attack vector development for user phishing
  • Abuse bastion host

Pre-Requisites:

Eagerness to Learn Understanding of Web and Network Penetration Testing Knowledge of Active Directory Network Pivoting Basics Recommended for Advanced Professionals

Skills Reflected by Certificate Holder:

  • Planning & executing an organized sophisticated attack
  • Identifying & Manipulating weakest link in the chain of target
  • Utilizing “out-of-the-box” techniques to execute as organized adversaries
  • Extensive Recon in Internal & External Enterprise infrastructure
  • Performing sophisticated post-exploitation and persistent activities
  • Perform Advance Kerberos based attacks in fully patched Active Directory environment (both Linux & Windows)
  • Bypassing host-level & network-level restrictions
  • Breaking from Containerized Environment
  • Securing enterprise networks

Copyright ©2021 CyberWarFare Labs. All Rights Reserved