WINDOWS EXPLOITATION / RT424

FIVE   |   EIGHT   |   90%   |   40

           SCENARIOS                   LABS                       HANDS-ON           DURATION

In this training, you will learn about Windows operating system, and you will experience in both offensive and defensive methods, knowing how to break into the system is not the same as understanding how to defend against the attack.  Students will learn the latest hacking methodologies and use of different attack methods on the various Windows operating systems and Windows applications, and on the other side, how to defend against them.

LAB 01

Advanced Enumeration

LAB 02

Attacking the Host

LAB 03

Privilege Escalation

LAB 04

Red-Teams PowerShell

LAB 05

Mass Attack

LAB 06

Domain Exploitation

LAB 07

Post Exploitation

LAB 08

Exploiting with Updates

Scenario: WE001

Russian anti-virus company is warning users about the malicious program, which is helping attackers carry out mass spam mailings and allow the attacker to use a victim's PC as a slave of his DDOS Army. Our company requires you, assistants, to gain control of the CNC server related to the DDOS attack, which controlled by that server.

photo_2020-05-14_13-04-43.jpg

Scenario: WE002

Computers used by the Minnesota police department suffered from data exposure. The IT team which dealt with the case said that a keylogger was installed on their systems, apparently due to Windows update. An attacker used the vulnerability to harvest sensitive police information. As a part of the red team security, help the police fin the server holding their data and retrieve the stolen data.

Annotation 2020-05-21 232921.jpg

Scenario: WE003

A team of security researchers has discovered high-risk security vulnerabilities in more than 40 drivers. A medical center in Poland was one of the victims for the vulnerability used by an attacker, which took out defensive security applications from within kernel mode. Now the medical center wants you to run red team testing on the new environment they build for future attacks.

photo_2020-05-14_13-10-36.jpg

Scenario: WE004

A hacker running crypto-miners (RATs) since 2018, implemented a backdoor on a small health care company called BioGenex, which held an antidote to a virus. During his way out, he left some suspicious information on the target machine. Use your skill to gain access to the attackers' machine, gain the highest privilege.   

photo_2020-04-01_16-01-36.jpg

Scenario: WE005

The University of Valencia discovered a WSUS server contacts Microsoft for driver updates, it does so use XML SOAP web services, and those validations are not made over SSL. All update packages that are downloaded from the Microsoft Update website are signed with a Microsoft signature. The attacker injected a malicious update using MiTM and infected several computers in the University.

photo_2020-05-14_13-15-13.jpg
LINKS
CONTACT
  • White LinkedIn Icon
  • White Facebook Icon

Ze'ev Jabotinsky St 7,
Ramat Gan, IL.
+972-3-9629018
info@ThinkCyber.co.il

© 2020 by ThinkCyber