There is a growing need for cyber security experts with the rising data sensitivity and protection mindset across the world. As the threats grow complex, mere protective measures fall short to do the job. It is then time for a Red Team penetration testing Professional to conduct offensive penetration testing that helps to reveal all the essential loopholes that can trigger an attack. Now, as a Red Teamer or Red Team Expert, you are expected to perform and know a range of tools, techniques, and skills that are necessary to attack IT systems to reveal vulnerable areas that require more robust protection.
Any organization has multiple teams in their cybersecurity teams, and the Red Team is a crucial part of that structure. We provide you with hands-on training on foolproof red teaming techniques like identification, prevention, and mitigation of vulnerabilities leading to attacks. You will learn to mimic the mindset of a hacker and abuse/ violate IT systems and Infrastructure that are vulnerable to a possible future cyber attack/ threat.
Our Red Team Training course has numerous practical sessions designed to create an environment of learning and application to build a robust upskilling process with an effective learning methodology. The course is created, designed, and reviewed by certified cybersecurity experts and Red Team certified professionals for budding Red Teamers out there! Our course has all the material that you will need to start your training process to be a skilled Red Team cyber security expert. The courseware contains various strategies and techniques like:
- Abusing/ violating IT sensitive Infrastructure and security systems to detect loopholes
- Hunting/ Finding vulnerabilities in IT systems to counter possible future threats
- Learning to mimic the offensive hacker mindset and approach to IT abuse/ offense
- Creating dynamic attack environments to perfectly analyse and assess a possible attack
- Master the tools and techniques necessary to become a Red Team Hacking Expert!
Our Red Team Certified Training program is a one-of-a-kind course where you get to learn from the best of the best in offensive IT security. After completing this training course, you will be able to effectively plan and execute attacks on a range of IT systems and software, abuse and penetrate sensitive applications, learn about Golden ticket and ACLs abuse, and much more!
So, wait no more and enroll in this exciting course and open a world of opportunities in offensive cyber security!
RedTeam Course Content
- Introduction to Pen-Testing
- Penetration Testing Benefits
- Types of Penetration Testing
- Penetration Testing Methodologies
- Law & Compliance
- Planning, Managing & Reporting
- Hands On with Linux
- The Linux Filesystem
- Basic Linux Commands
- Finding Files in Linux
- Managing Linux Services
- Searching, Installing, and Removing Tools
- The Bash Environment
- Piping and Redirection
- Text Searching and Manipulation
- Backgrounding Processes (bg)
- Jobs Control
- Process Control
- File and Command Monitoring
- Downloading Files
- Persistent Bash Customization
- Scripting Skills
- Introduction to Shell
- Script Basics
- Global Declarations
- Variable basics
- Escape characters
- Basic redirection and pipe
- Understanding Conditions
- Understanding Loops
- Recursion and Nested Functions
- Function Attributes
- The Linux Execution Environment with Scripts
- Restricted Shells
- Introduction to Python
- What is Python?
- Python: Favourite of Hackers
- Data Types and variables
- Control Flow and Data structure
- Functions, Functional Programming and File Handling
- Exception Handling
- Creating Managing File and Directory Access
- Raw Socket basics
- Socket Programming with Python
- Servers and Clients architecture
- Creating Sniffers (wired and wireless)
- Creating packet injector
- Introduction to Shell
- Introduction to Red Team’s Plan and Execution
- What is Red Teaming?
- Red Team Attack Lifecycle (Phases)
- Red Team Infrastructure
- Enterprise Environment Overview
- Technologies Exploitation in Red Teaming
- Web Technology
- Network Technology
- Physical Red Teaming
- Cloud Technology
- Wireless
- Why organizations need Red Team?
- Red Team Exercise Execution
- Information Gathering & Enumeration
- Types of Information Gathering
- OSINT: Case Study
- Extensive OSINT Enumeration
- Google Search
- Google Hacking
- User Enumeration & Phishing
- Forward Lookup Brute Force
- Reverse Lookup Brute Force
- DNS Zone Transfers
- Port Scanning
Null Sessions
- Enum4Linux
- VRFY Script
- Python Port
- Red Team Kill Chain
- Initial Access & Delivery
- Weaponization
- Command & Control
- Credentials Dumping
- Lateral Movement
- Establishing Persistence
- Data Exfiltration
- Advanced Windows Exploitation
- Operating System and Programming Theory
- Win32 APIs
- Windows Registry
- What are Macros?
- Creating Dangerous Macros using Empire
- Microsoft Office Phishing using Macros
- Executing Shellcode in Word Memory
- PowerShell File Transfers
- VBA Shellcode Runner
- PowerShell Shellcode Runner
- Reflection Shellcode Runner in PowerShell
- Client-Side Code Execution with Windows Script Host
- Credential Replay Attacks
- Credential Discovery
- Hashing Concept
- Pass the Hash (PTH)
- Kerberoasting and AS-REP Roasting
- Pass the Ticket (PTT)
- Binary Analysis and Exploitation
- WinDbg and x86 Architecture
- Introduction to x86 Architecture
- Introduction to Windows Debugger
- Accessing and Manipulating Memory from WinDbg
- Introduction to IDA Pro
- Static-Dynamic Analysis Synchronization
- Double Pivoting
- Windows Defender Exploit Guard
- Binary diffing with BinDiff 5
- Visualizing code changes and identifying fixes
- Reversing 32-bit and 64-bit applications and modules
- The Metasploit Framework
- Exploring Metasploit Framework
- Using Metasploit Auxiliary
- Using Exploit Modules
- Staged and Non-Staged Payloads
- Working with Multi Handler
- Working with Meterpreter Session
- Exploiting Overflows – Linux & Windows
- Stack Overflows Introduction
- A Word About DEP, ASLR, and CFG
- Replicating the Crash
- Controlling EIP
- Stack Overflows and ASLR Bypass
- ASLR Introduction
- ASLR Implementation
- ASLR Bypass Theory
- Windows Defender Exploit Guard and ASLR
- Understanding SEH
- Exploiting SEH Overflows
- Understanding the low fragmentation heap
- Heap Overrun/Overflow
- Privilege Escalation
- Windows Privilege Escalation
- Understanding Windows Privileges and Integrity Levels
- User Account Control (UAC) Bypass: fodhelper.exe Case Study
- Insecure File Permissions: Servio Case Study
- Leveraging Unquoted Service Paths
- Windows Kernel Vulnerabilities: USBPcap Case Study
- Linux Privilege Escalation
- Understanding Linux Privileges
- Insecure File Permissions: Cron Case Study
- Insecure File Permissions: /etc/passwd Case Study
- Kernel Vulnerabilities: Case Study
- Windows Privilege Escalation
- Lateral Movement & Pivoting Techniques
- Lateral Movement and Network Pivoting
- File-Less Lateral Movement Methodologies
- Understand Local, Remote Port Forwarding Using Chisel, various proxies etc
- Multi-level in-depth network pivoting in Windows & Linux OS
- Lateral Movement with SSH
- SSH Hijacking Using SSH-Agent and SSH Agent Forwarding
- Advanced Web Attacks
- OWASP Standards
- Broken Web Application
- ATutor & JuiceShop
- Web Traffic Inspection using Burpsuite
- Atmail Mail Server Appliance: from XSS to RCE
- Session Hijacking
- Session Riding
- Authentication Bypass and RCE
- Injection Attacks
- ATutor LMS Type Juggling Vulnerability
- Attacking the Loose Comparison
- Magic Hashes
- JavaScript Injection Remote Code Execution
- Cookie Deserialization RCE
- Server-Side Template Injection
- XSS and OS Command Injection
- Advanced XSS Exploitation
- RCE Hunting
- Introduction to Wireless Security
- Cracking Wireless Encryptions
- Cracking WEP
- Cracking WPA, WPA2 & WPA3
- WIFI-Phishing
- Dos Attack: WIFI Jamming
- Securing WAP
- Auditing and Reporting
- AWS Pen testing
- Building and setup AWS pen testing Environment
- Exploiting S3
- Understanding and exploiting Lambda Services
- Testing IAM privileges
- Case study For Capital One Attack.
- Mitre ATT&CK Red Teaming
- Follow Mitre ATT&CK Framework
- Playing with Mitre
- Testing with Caldera
- Atomic Red Team Test for MITRE-ATT&CK
- Utilizing LOLBAS for stealth persistence & Data Exfiltration
- Deliverables – Report Writing
- Defining Methodology
- Types of Reports
- Executive Summary
- Detailed Reports
- Adding Proof of Concept
- Creating Drafts
- Risk Rating Factors
- Automating Reports
- Report Writing Tools