On This Page

Black Ops Hacking for Pentesters - Master Level

SensePost | December 4 - 5


Criminal markets have grown at an alarming rate. From financial fraud classes on offer in Brazil, to Russian botnet masters renting out expertise and infrastructure for those wishing to start a career in cyber crime, the tactics, techniques and procedures (TTP's) used by attackers today go beyond simply getting lucky with SQLi.

Our Master course is about emulating such attackers and their attach scenarios in exploiting all areas of the OSI layer, including 8th (the human). From initial footprinting of a target environment, to building up an attack pattern based on architecture choices, to targeting humans and gaining an initial foothold into the network using targeted phishing campaigns and techniques used by APT actors during the last few years.

This course is all about how APTs targeting individuals, networks and moving laterally while doing so undetected. Perfect for those who work in a red team environment and for those who would like to lift the curtains of cyber crime underground.

At the end of this course, students will be versed in the art of:

  • Introduction in to the underground market services.
  • Multi-vector client-side attack vectors (host, network, application and mobile) and compromise.
  • Running and maintaining a multi staged botnet campaign (Win/Android) using real world malware tools such as Gaudox/H1N1/Andromeda/Carberp and Mazar on the mobile side.
  • Payload construction (we will e covering many different vectors of malicious code delivery and execution, falling far beyond standardized Macros)
  • HIPS evasion (IDS,AV,EDR,DLP)
  • Post compromise privilege escalation, persistence and lateral movement.
  • Post exploitation under Windows, OS X and Linux.
  • Internal data harvesting and extrusion.

What's new for 2017?

In what is our biggest change to training at Black Hat in over 15 years, we've moved our entire training operation into Amazon's AWS cloud.

This means that each student signing up to our courses gets access to their own training environment, allowing for as much haxory and experimentation, without other students being impacted. We've also strived to make the theory as practical as possible and break away from death by slides.

It means we are able to move our training away from having "theory sections" and "practical sections" to a full course of pure pwnage.

Who Should Take this Course

Master is designed for experienced penetration testers, network administrators, security professionals, and IT security enthusiasts who have a need to acquaint themselves with real-world offensive red-teaming techniques, tactics, and tools.

Student Requirements

Students need to ensure they have the necessary level of skill. No hacking experience is required for this course, but a solid technical grounding is an absolute must.

What Students Should Bring

Students should bring a laptop that is capable of running a Kali VMware image, has a Ethernet port available (or a USB Ethernet adapter) and a user that has administrator rights. Please do not bring any devices that contain "Corporate" information.

What Students Will Be Provided With

We have developed a training portal that will be made available to all students before they attend Black Hat. This portal allows you to register an account and gain access to the slides used and any prerequisite information we feel would help you get the best out of this course. All content for the course, including tools required and instructions to configure your environment, will be made available via the training portal before you start, which means less time setting up and more time for learning.

Access to this portal will not stop once the course has finished, allowing you to continue learning in the weeks/months after Black Hat.


SensePost has been training at Blackhat since 2001. We pride ourselves on ensuring our content, our training environment and trainers are all epic in every way possible. From working penetration testers, responsible for numerous tools and vulnerablities, to environments tailored for learning, training is at the core of what we do