Trainings Hardening and Secure Configuration of Windows Systems

Hacking Extreme – Special Edition

Instructors: cirosec consultants

Duration: 2 days

You can achieve the greatest possible level of security only if you know the attackers, the methods they use and the way they proceed, and if you can understand both their way of thinking and their motives.

Security mechanisms are often planned and developed only from the perspective of an admin or a network expert. In general, however, the way an attacker sees things greatly differs from this, which is one of the reasons why successful attacks on company networks happen repeatedly.

This intensive training will illustrate the way an attacker proceeds beyond web applications. Starting with information gathering, we will, in numerous steps, cover Linux servers, Windows clients and the domain. The training includes both well-known and lesser-known attacking techniques: from basic classics up to bypassing modern security mechanisms, from conceptual problems down to hardware processing. Numerous demonstrations will examine examples from real life.

In several laboratory exercises, you will get to put into practice what you have learned. For this purpose, each participant will be provided with a laptop with numerous tools and exploits, which go far beyond usual scanners. In addition to several aha moments, participants will be able to evaluate and assess security-relevant questions realistically this way.

The trainers carry out security assessments on a regular basis, and they will pass on their practical experience and insider knowledge they have obtained in this field.

Topics covered:

  • Basics
    • Motivation of attackers
    • Terminology / definition of important terms
    • Possible points of attack
  • Information gathering
    • Sources of information
    • DNS-based information gathering
    • Host discovery
    • Port scanning
    • Fingerprinting (active, passive)
    • Firewall/IDS evasion
    • Information from log files
    • Information disclosure by the browser
  • Software vulnerabilities / Binary exploitation in general
    • Technical basics for reverse engineering
    • Format-string vulnerabilities
    • Buffer overflows
    • Logical errors
    • Shellcoding
    • Applied countermeasures and bypassing, including
      • ASLR
      • DEP/NX/XD
      • SSP/Canaries/Cookies
      • SafeSEH
      • SEHOP
      • RELRO
  • Targeted privilege escalation
    • Linux and Windows part
    • Protection domains (user mode, kernel mode and even below)
    • SUID/SGID
    • Kernel exploitation
    • Configuration errors
    • Race conditions

  • Windows-specific attacks
    • Client applications (Office, browser, ...)
    • LM, NTLM and NTLMv2 vulnerabilities
    • Pass-the-hash attacks
  • Network-based attacks (in a switched environment)
    • Sniffing
    • Spoofing
    • Man in the middle
      • SSH
      • TLS
      • RDP
  • Post exploitation
    • Rootkits
    • Backdoor technologies
    • Defacement
    • Host hopping
  • Other topics included
    • Social engineering
    • Tools and frameworks
    • Attacks on SSL/TLS
    • Downgrade attacks
    • Side-channel attacks
    • Attacks on passwords/password hashes

The topics covered will be explained using demonstrations and exercises.

Operating systems covered:
Linux/Unix environment and Windows

Target group:
Admins, network experts, security managers and employees on management level who are not afraid of viewing (in)security through the attacker’s eyes, diving deeply into a technical world.

Prerequisite:
Knowledge of the basic processes of using and administrating Windows and Linux systems. Knowledge of the TCP/IP stack and the functionality of common protocols would be of advantage.

Maximum number of participants: 15 persons

Price: € 2,000

Date: February 4-5, 2019, the two days before the IT-Defense conference starts.

The training is conducted in German by two experienced trainers. They work as consultants and can thus complement the course with comprehensive and recent practical experience.

You will receive CPE Points for participating in the training. The training takes 16 hours. You will get a certificate after having completed the training.

Location:
Maritim Hotel Stuttgart
Seidenstraße 34
70174 Stuttgart
Tel. +49 711 942-0
Fax: +49 711 942-1000
E-Mail: info.stu@maritim.de
www.maritim.de/Stuttgart