OffSec Evasion Techniques and Breaching Defenses (PEN-300)
Navigation X

[Big Banner Ad Space Available]
[Big Banner Ad Space Available]

OffSec Evasion Techniques and Breaching Defenses (PEN-300)

posted by Sauron and Last Post: 4 months ago


PENTESTING  OffSec Evasion Techniques and Breaching Defenses (PEN-300)  4117
simple21 Junior Member
1
Posts
0
Threads
Junior Member
#21
thanksss you aloot
yeyox26606 Junior Member
4
Posts
0
Threads
Junior Member
#22
Great stuff!
MkSa Junior Member
3
Posts
0
Threads
Junior Member
[This post was last modified: 5 months ago by MkSa ]
#23
(11 months ago)Sauron Wrote:
[Image: Course-PEN-300.png]
 PEN-300 is an advanced course for penetration testers, building on the skills and techniques learned within PEN-200. This course explores advanced penetration testing techniques against hardened targets in mature organizations with an established security function. Within this course, you will go beyond the use of existing tools and skills and be encouraged to develop new techniques and tools. By taking on this course, learners will be proving their advanced phishing skills, advanced antivirus evasion tactics, and establish attack vectors that leverage or disclose Windows credentials.
PEN-300 includes a wide array of current techniques and skills, including:
  • migrating between processes to evade detection and maintain control even if one process is terminated
  • modifying attack vectors from Word macros within an executable to deliver a staged Meterpreter payload directly in memory
  • discussing the drawbacks of PowerShell code that invokes Win32 APIs through the .NET framework and examine a more advanced and stealthy technique known as reflection
  • executing "living off the land" techniques to gain ever-increasing access to the system and its back-end networks
  • adding advanced techniques for maintaining access and escalating privileges on compromised Windows systems, including navigating file systems, manipulating user accounts, extracting sensitive information, and establishing persistent backdoors
PEN-300 is organized into 22 modules, each starting with theory and then diving into practical application of that theory. Modules have hands-on exercises and code snippets to aid the learner when more practical application of the knowledge is required for understanding and application. Many modules also have videos to help provide visual support for learners. After completion of the course materials, learners can take advantage of the 7 Challenge Labs which bring the knowledge and skills together for learners and prepare them for the OSEP exam. The exam forces the learner to demonstrate the ability to identify, exploit, and report on vulnerabilities, culminating in the development of custom exploits
Since the goal of this course is to teach offensive techniques that work against client organizations with hardened systems, we expect students to have taken the PEN-200 course and passed the OSCP exam or have equivalent knowledge and skills. While this is not a requirement, learners without this formal base of knowledge, as well as a strong understanding of operating systems, networking, and scripting (e.g., Python, Bash), could face difficulties.
Learning Objectives
After completion of this course, learners will be able to:
  • Develop client-side attack techniques using Microsoft Office and other common applications.
  • Master antivirus evasion methods and tools.
  • Bypass application whitelisting mechanisms like AppLocker.
  • Implement advanced lateral movement strategies in Windows and Linux environments.
  • Conduct sophisticated Active Directory exploitation and attacks.
  • Evade network detection systems, including IDS and IPS.
  • Perform advanced exploitation of Microsoft SQL and Active Directory.
  • Use advanced programming concepts and Win32 APIs for attack development.


SPOILER Show

Hlw everyone
brod Junior Member
10
Posts
0
Threads
Junior Member
#24
tyyyyyyyyyyyyyyyyyyy
tracel3ss Junior Member
6
Posts
0
Threads
Junior Member
#25
(11 months ago)Sauron Wrote:
[Image: Course-PEN-300.png]
 PEN-300 is an advanced course for penetration testers, building on the skills and techniques learned within PEN-200. This course explores advanced penetration testing techniques against hardened targets in mature organizations with an established security function. Within this course, you will go beyond the use of existing tools and skills and be encouraged to develop new techniques and tools. By taking on this course, learners will be proving their advanced phishing skills, advanced antivirus evasion tactics, and establish attack vectors that leverage or disclose Windows credentials.
PEN-300 includes a wide array of current techniques and skills, including:
  • migrating between processes to evade detection and maintain control even if one process is terminated
  • modifying attack vectors from Word macros within an executable to deliver a staged Meterpreter payload directly in memory
  • discussing the drawbacks of PowerShell code that invokes Win32 APIs through the .NET framework and examine a more advanced and stealthy technique known as reflection
  • executing "living off the land" techniques to gain ever-increasing access to the system and its back-end networks
  • adding advanced techniques for maintaining access and escalating privileges on compromised Windows systems, including navigating file systems, manipulating user accounts, extracting sensitive information, and establishing persistent backdoors
PEN-300 is organized into 22 modules, each starting with theory and then diving into practical application of that theory. Modules have hands-on exercises and code snippets to aid the learner when more practical application of the knowledge is required for understanding and application. Many modules also have videos to help provide visual support for learners. After completion of the course materials, learners can take advantage of the 7 Challenge Labs which bring the knowledge and skills together for learners and prepare them for the OSEP exam. The exam forces the learner to demonstrate the ability to identify, exploit, and report on vulnerabilities, culminating in the development of custom exploits
Since the goal of this course is to teach offensive techniques that work against client organizations with hardened systems, we expect students to have taken the PEN-200 course and passed the OSCP exam or have equivalent knowledge and skills. While this is not a requirement, learners without this formal base of knowledge, as well as a strong understanding of operating systems, networking, and scripting (e.g., Python, Bash), could face difficulties.
Learning Objectives
After completion of this course, learners will be able to:
  • Develop client-side attack techniques using Microsoft Office and other common applications.
  • Master antivirus evasion methods and tools.
  • Bypass application whitelisting mechanisms like AppLocker.
  • Implement advanced lateral movement strategies in Windows and Linux environments.
  • Conduct sophisticated Active Directory exploitation and attacks.
  • Evade network detection systems, including IDS and IPS.
  • Perform advanced exploitation of Microsoft SQL and Active Directory.
  • Use advanced programming concepts and Win32 APIs for attack development.


SPOILER Show

ty m8!!
Hank8900 Member
15
Posts
0
Threads
Member
#26
(11 months ago)Sauron Wrote:
[Image: Course-PEN-300.png]
 PEN-300 is an advanced course for penetration testers, building on the skills and techniques learned within PEN-200. This course explores advanced penetration testing techniques against hardened targets in mature organizations with an established security function. Within this course, you will go beyond the use of existing tools and skills and be encouraged to develop new techniques and tools. By taking on this course, learners will be proving their advanced phishing skills, advanced antivirus evasion tactics, and establish attack vectors that leverage or disclose Windows credentials.
PEN-300 includes a wide array of current techniques and skills, including:
  • migrating between processes to evade detection and maintain control even if one process is terminated
  • modifying attack vectors from Word macros within an executable to deliver a staged Meterpreter payload directly in memory
  • discussing the drawbacks of PowerShell code that invokes Win32 APIs through the .NET framework and examine a more advanced and stealthy technique known as reflection
  • executing "living off the land" techniques to gain ever-increasing access to the system and its back-end networks
  • adding advanced techniques for maintaining access and escalating privileges on compromised Windows systems, including navigating file systems, manipulating user accounts, extracting sensitive information, and establishing persistent backdoors
PEN-300 is organized into 22 modules, each starting with theory and then diving into practical application of that theory. Modules have hands-on exercises and code snippets to aid the learner when more practical application of the knowledge is required for understanding and application. Many modules also have videos to help provide visual support for learners. After completion of the course materials, learners can take advantage of the 7 Challenge Labs which bring the knowledge and skills together for learners and prepare them for the OSEP exam. The exam forces the learner to demonstrate the ability to identify, exploit, and report on vulnerabilities, culminating in the development of custom exploits
Since the goal of this course is to teach offensive techniques that work against client organizations with hardened systems, we expect students to have taken the PEN-200 course and passed the OSCP exam or have equivalent knowledge and skills. While this is not a requirement, learners without this formal base of knowledge, as well as a strong understanding of operating systems, networking, and scripting (e.g., Python, Bash), could face difficulties.
Learning Objectives
After completion of this course, learners will be able to:
  • Develop client-side attack techniques using Microsoft Office and other common applications.
  • Master antivirus evasion methods and tools.
  • Bypass application whitelisting mechanisms like AppLocker.
  • Implement advanced lateral movement strategies in Windows and Linux environments.
  • Conduct sophisticated Active Directory exploitation and attacks.
  • Evade network detection systems, including IDS and IPS.
  • Perform advanced exploitation of Microsoft SQL and Active Directory.
  • Use advanced programming concepts and Win32 APIs for attack development.


SPOILER Show

gdshell Junior Member
10
Posts
0
Threads
Junior Member
[This post was last modified: 4 months ago by gdshell ]
#27
(11 months ago)Sauron Wrote:
[Image: Course-PEN-300.png]
 PEN-300 is an advanced course for penetration testers, building on the skills and techniques learned within PEN-200. This course explores advanced penetration testing techniques against hardened targets in mature organizations with an established security function. Within this course, you will go beyond the use of existing tools and skills and be encouraged to develop new techniques and tools. By taking on this course, learners will be proving their advanced phishing skills, advanced antivirus evasion tactics, and establish attack vectors that leverage or disclose Windows credentials.
PEN-300 includes a wide array of current techniques and skills, including:
  • migrating between processes to evade detection and maintain control even if one process is terminated
  • modifying attack vectors from Word macros within an executable to deliver a staged Meterpreter payload directly in memory
  • discussing the drawbacks of PowerShell code that invokes Win32 APIs through the .NET framework and examine a more advanced and stealthy technique known as reflection
  • executing "living off the land" techniques to gain ever-increasing access to the system and its back-end networks
  • adding advanced techniques for maintaining access and escalating privileges on compromised Windows systems, including navigating file systems, manipulating user accounts, extracting sensitive information, and establishing persistent backdoors
PEN-300 is organized into 22 modules, each starting with theory and then diving into practical application of that theory. Modules have hands-on exercises and code snippets to aid the learner when more practical application of the knowledge is required for understanding and application. Many modules also have videos to help provide visual support for learners. After completion of the course materials, learners can take advantage of the 7 Challenge Labs which bring the knowledge and skills together for learners and prepare them for the OSEP exam. The exam forces the learner to demonstrate the ability to identify, exploit, and report on vulnerabilities, culminating in the development of custom exploits
Since the goal of this course is to teach offensive techniques that work against client organizations with hardened systems, we expect students to have taken the PEN-200 course and passed the OSCP exam or have equivalent knowledge and skills. While this is not a requirement, learners without this formal base of knowledge, as well as a strong understanding of operating systems, networking, and scripting (e.g., Python, Bash), could face difficulties.
Learning Objectives
After completion of this course, learners will be able to:
  • Develop client-side attack techniques using Microsoft Office and other common applications.
  • Master antivirus evasion methods and tools.
  • Bypass application whitelisting mechanisms like AppLocker.
  • Implement advanced lateral movement strategies in Windows and Linux environments.
  • Conduct sophisticated Active Directory exploitation and attacks.
  • Evade network detection systems, including IDS and IPS.
  • Perform advanced exploitation of Microsoft SQL and Active Directory.
  • Use advanced programming concepts and Win32 APIs for attack development.


SPOILER Show

ty

(11 months ago)Sauron Wrote:
 
The file was removed. Can you update?


Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Users browsing this thread: 1 Guest(s)