C)PSH: Certified PowerShell Hacker
Here are just a few things you will take away from this course:
- Detailed Lab Manual
- VMs for performing labs on your own
- New ideas on testing your own AD infrastructure
- Attacks you can use immediately
How to secure against PowerShell attacks
Audience Profile
- Penetration Testers
- Microsoft Administrators
- Security Administrators
- Active Directory Administrators
Anyone looking to learn more about security
At Course Completion
Upon completion, the Certified PowerShell Hacker candidate will be able to competently take the CPSH exam.
Prerequisites:
General Understanding of Pen Testing
General Understanding of Active Directory
General Understanding of scripting and programming
Available as Self-Study Ultimate Combo for $1,200.00 and includes:
• One Year Online Course Access
• Videos
• Workbook
• Lab Guide
• Cyber Range Access
• Exam Prep Guide
• Practice Quiz
• Certification Exam (2 attempts)
Outline
Module 1 Introduction to PowerShell
- Different Tool Options
- Installing everything needed
- Language Basics
- Using the Windows API and WMI
- Interacting with the Registry
- Managing Objects and COM Objects
Module 2 – Introduction to Active Directory and Kerberos
- Overview of Kerberos
- The three-headed monster
- Key Distribution Center
- Kerberos in Detail
- Why we care about Kerberos as a Hacker
- Overview of Active Directory
- Understanding AD concepts
- AD Objects and Attributes
Module 3 – Pen Testing Methodology Revisited
- Introduction to the methodology
- The Plan!!
- Vulnerability Identification
- Client-side attacks with and without PowerShell
Module 4 – Information Gathering and Enumeration
- What can a domain user see?
- Domain Enumeration
- Trust and Privileges Mapping
- After the client exploit
Module 5 – Privilege Escalation
- Local Privilege Escalation
- Credential Replay Attacks
- Domain Privilege Escalation
- Dumping System and Domain Secrets
- PowerShell with Human Interface Devices
Module 6 – Lateral Movements and Abusing Trust
- Kerberos attacks (Golden, Silver Tickets and more)
- Delegation Issues
- Attacks across Domain Trusts
- Abusing Forest Trusts
- Abusing SQL Server Trusts
- Pivoting to other machines
Module 7 – Persistence and Bypassing Defenses
- Abusing Active Directory ACLs
- Maintaining Persistence
- Bypassing Defenses
- Attacking Azure Active Directory
Module 8 – Defending Against PowerShell Attacks
- Defending an Active Directory Infrastructure
- Detecting Attacks
- Logging
- Transcripts
- Using Certificates
- Using Bastion Hosts
- Using AppLocker
Sorry! It looks like we haven’t updated our dates for the class you selected yet. There’s a quick way to find out. Contact us at 502.265.3057 or email info@training4it.com
Request a Date