Navigation X

OffSec Evasion Techniques and Breaching Defenses (PEN-300)

Posted by Sauron posted at


OffSec Evasion Techniques and Breaching Defenses (PEN-300)  81
Sauron Moderator
1,033
Posts
1,026
Threads
Moderator
#1
[Image: Course-PEN-300.png]
 PEN-300 is an advanced course for penetration testers, building on the skills and techniques learned within PEN-200. This course explores advanced penetration testing techniques against hardened targets in mature organizations with an established security function. Within this course, you will go beyond the use of existing tools and skills and be encouraged to develop new techniques and tools. By taking on this course, learners will be proving their advanced phishing skills, advanced antivirus evasion tactics, and establish attack vectors that leverage or disclose Windows credentials.
PEN-300 includes a wide array of current techniques and skills, including:
  • migrating between processes to evade detection and maintain control even if one process is terminated
  • modifying attack vectors from Word macros within an executable to deliver a staged Meterpreter payload directly in memory
  • discussing the drawbacks of PowerShell code that invokes Win32 APIs through the .NET framework and examine a more advanced and stealthy technique known as reflection
  • executing "living off the land" techniques to gain ever-increasing access to the system and its back-end networks
  • adding advanced techniques for maintaining access and escalating privileges on compromised Windows systems, including navigating file systems, manipulating user accounts, extracting sensitive information, and establishing persistent backdoors
PEN-300 is organized into 22 modules, each starting with theory and then diving into practical application of that theory. Modules have hands-on exercises and code snippets to aid the learner when more practical application of the knowledge is required for understanding and application. Many modules also have videos to help provide visual support for learners. After completion of the course materials, learners can take advantage of the 7 Challenge Labs which bring the knowledge and skills together for learners and prepare them for the OSEP exam. The exam forces the learner to demonstrate the ability to identify, exploit, and report on vulnerabilities, culminating in the development of custom exploits
Since the goal of this course is to teach offensive techniques that work against client organizations with hardened systems, we expect students to have taken the PEN-200 course and passed the OSCP exam or have equivalent knowledge and skills. While this is not a requirement, learners without this formal base of knowledge, as well as a strong understanding of operating systems, networking, and scripting (e.g., Python, Bash), could face difficulties.
Learning Objectives
After completion of this course, learners will be able to:
  • Develop client-side attack techniques using Microsoft Office and other common applications.
  • Master antivirus evasion methods and tools.
  • Bypass application whitelisting mechanisms like AppLocker.
  • Implement advanced lateral movement strategies in Windows and Linux environments.
  • Conduct sophisticated Active Directory exploitation and attacks.
  • Evade network detection systems, including IDS and IPS.
  • Perform advanced exploitation of Microsoft SQL and Active Directory.
  • Use advanced programming concepts and Win32 APIs for attack development.
Hidden Content
You must register or login to view this content.

SPOILER Show

Reply
del1ja500 Member
25
Posts
0
Threads
Member
#2
thanks mate
Reply
zildzian Member
23
Posts
0
Threads
Member
#3
Thanks a lot bro.
Reply

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Users browsing this thread: 1 Guest(s)