Learn to Exploit and Expand Access into Remote Networks Using Open Source Tools.
- Use client-side exploits against web browsers
- Deploy and control a botnet
- Learn how to tunnel and pivot deep into a network
OMA teaches the essentials of remote network exploitation by demonstrating offensive methodologies in a coherent framework. You’ll learn how to analyze remote networks, what the domain controller does, how to find credentials, as well as how to expand access across a network, and much more!
This course is for people who love network and computer security, programmers, and people who are responsible for protecting their organizations’ networks from threats. This course gives you an in-depth look at the essentials of remote network exploitation, from scanning and enumeration of a network space down to performing client-side attacks, which are quickly becoming the most reliable vector into target networks.
BUY VOUCHERS FOR THIS COURSE
Vouchers are a way to pre-pay for a course and allow students to take the course at a later date.
You will be introduced to the Offensive Methodology and Information Gathering using open source tools.
SCANNING & ENUMERATION
You will learn to scan networks and servers using nmap, analyze network packets (at a low level), and use simple python scripts to scan and enumerate remote web browsers.
You will learn to send exploits using the Metasploit Framework (MSF), advanced tunneling using custom tunneling executables, Metasploit pivoting, and SOCKS proxy tunnels. You’ll also perform manual Cross Site Scripting (XSS) and SQL Injection and compile and deploy actual malware to set up a small botnet using client-side exploits.
In this phase, you will learn in-depth about the Windows Registry, Offensive Digital Forensics, and Windows Active Directory queries. You’ll search for files of interest, learn to crack passwords, and use the pass-the-hash technique to maneuver around a remote Windows network.
You will learn to steal credentials to gain access to routers, and to crack Cisco passwords. You’ll also review routing and network infrastructures, and antivirus evasion techniques.
Finally, you’ll take the capstone which can take up to a full day and combines all of the skills learned in the previous two weeks. You are given a target domain name to scan the DMZ for servers, mine for email addresses, and use server-side and client-side exploits, all to gain access to a remote network. Once inside, you will find a large network and practice tunneling and pivoting to reach the data.
At Parrot Labs, we make it easy. You show up, we provide the tools. Our classroom facility is conveniently located near the BWI airport, and just down the street from a hotel where you can stay if you’re from out of town.
Each student is provided with a high-end workstation consisting of an i7 quad-core with 16Gb RAM. You will also have two monitors that provide the visual space necessary to comfortably perform a network attack, watch a packet capture, take online notes, and perform research.
The classroom has two HD projectors with two screens. This allows students to view demos on one screen while viewing instructional slides on the other.
OMA (Single Seat)
- Included: Parrot Labs OMA Textbook
- Course length: 10 Days
OMA (Group Discount for 10 or More Students)
- Included: A Parrot Labs OMA Textbook
- Course length: 10 Days
Additional group and government discounts available, just email us.
Q: How many of the Fortune 500 are compromised? A: 500. — Mikko Hypponen
What will you get out of this course?
You will learn the full process that an attacker may use to attack your networks and organizations. You will receive in-depth, hands-on training on a variety of tools for gaining access to a remote network.
What makes this course unique?
Parrot Labs creates a large scale, realistic network for each student. Each individual network has four routers, functioning domain controllers, a functioning root DNS server, multiple domains with DMZs to find and scan, and internal networks that are live and active.
You’ll perform all of your exercises and scenarios in a sandboxed network. Each student has the same set of IP addresses, but different computers. So if a fellow student crashes their copy of a web server (it happens!), you can continue to work on your copy of the web-server without interruption.