TRAINING COURSES

HOME   /   TRAINING   /   TACTICAL EXPLOITATION: WINDOWS/UNIX

Tactical Exploitation: Attacking Windows & Unix

Instructed by Alex Testa

This four-day course introduces a tactical approach that does not rely on exploiting known vulnerabilities. Using a combination of new tools and lesser-known techniques, participants will learn how hackers compromise Windows and Unix systems without depending on standard exploits. The class alternates between theory and hands-on testing, providing students with an opportunity to put their new skills to the test. Course content features the latest security practices including Windows 2016 and additional WMI-based techniques.

Classes are limited. Get registered!

Learn the following key skills:

Windows
  • Introductory Concepts and Thinking Like an Attacker
  • Host Recon
  • Privilege Escalation
  • Key Decoding
  • Persistence
  • Network Recon
  • Lateral Movement
Unix
  • Leveraging Trusts & Lateral Movement
  • Kerberos Inherent Weaknesses
  • SSH Abuse
  • LD_PRELOAD Tricks
  • PAM Trojaning
  • X11 Attacks

A windows based virtual machine is provided for each student to connect to via the Remote Desktop Protocol (RDP).

windows
  • LEVEL

Advanced

  • FORMAT

In-Person Hybrid (In-Person & Live-Online)

  • DATE & LOCATION

2024 - TBA

  • DURATION

4 days, 32 hours

  • TARGET AUDIENCE

Penetration Testers, Detection and Response Staff, System Administrators and Developers

  • Standard Rate

Requirements

  • A concept of scripting languages such as Python/Perl/Ruby/Bash.
  • A familiarity with UNIX system administration and networking concepts
  • Their own machines. Student machines can be of any platform but must include SSH, a web browser, and PDF Viewer. Students must also have sufficient administrative access and understanding of configuring network settings in order to make configuration changes as necessary.

Prerequisites

See course outline for details.

Why choose the Center for Cyber Security Training

Interactive, classroom-based learning

Subject matter experts

Trusted by US government agencies

Alessandro Testa

Alex has been a Security Researcher, Pen Tester, and Developer for Attack Research, LLC for over 5 years. He has over 20 years of experience in private sector development and security research. Attack Research is a boutique computer security consulting firm which is devoted to a deep understanding of the mechanics of computer attacks. Industry specialties range from embedded systems, avionics, and automotive to government, financial, and Fortune 500 enterprise environments.

1200px-Emblem_of_the_United_States_Navy (1)
Excellent presentation, information and demonstrations! The 'war stories' and examples discussed during the class are valuable for industry leaders/managers.

- Neil S., US Navy

Want more information?

Download the Tactical Exploitation: Windows/Unix course outline now.

Upcoming Training Sessions

March 27-30, 2023 (Hybrid) October 2-5, 2023 (Hybrid)

Classes are limited.

Enroll Now.

Related Courses

Our classroom delivers the most in-demand content from the highest profile subject matter experts. Intense and interactive, our courses prepare students with actionable insight and proven strategies.

applied-data-science-for-cyber-security

Applied Data Science for Cyber Security

This interactive course teaches security professionals how to use data science techniques to quickly manipulate and analyze network and security data and ultimately uncover valuable insights. Topics range from data preparation to machine learning and implementation.

exploit-development-bootcamp

Exploit Development Bootcamp & Advanced

Our three-day Bootcamp will teach both basic & advanced techniques from a leading exploit developer. In our Advanced course, experienced students will learn how to write exploits that bypass modern memory protections for the Win32 platform in a fast-paced, interactive learning environment.

Looking for a course that's not here? We'd love to hear your suggestions!

Are you fully prepared to deal with today's increasing cyber security risks? We can help you get the training you need.

TRAINING INQUIRY

*We respect your privacy