Hackers penetrate enterprise networks in the flash of an eye, ravage endpoints for sensitive data, and silently exfiltrate the keys to your kingdom without every popping up an alert. Dark Side Ops: Custom Penetration Testing enables participants to "break through" to the next level by removing their dependence on 3rd-party penetration testing tools, allowing for outside-the-box thinking and custom tool development designed specifically for the target environment. Participants are provided with hands-on experience into the black hat techniques currently used by hackers to bypass network-based enterprise intrusion detection and prevention systems (IDS/IPS), layer 7 web proxies, and data loss prevention (DLP) solutions. The custom approach doesn't stop there. Participants learn advanced evasion techniques of corporate host-based countermeasures, including anti-virus and application whitelisting solutions by developing, compiling, and deploying custom backdoors, payloads, and persistence deep into protected enterprise networks.
At the end of this course students will be able to:
Dark Side Ops: Custom Penetration Testing is ideal for offensive security enthusiasts ready to take their skills beyond tool, script, or fill-in-the-blank penetration testing framework dependence. L33t programming skills are not necessary to enjoy this course. If you're interested in being able to build or modify custom offensive tools to bypass the latest offensive countermeasures, this course is for you. This course is equal parts attack/exploit, malware coding/programming, and hands-on lab environment. Participants will not leave this course disappointed.
Students should have at least:
Windows 7 virtual machine with the following software installed on it: