Please call to register for this class.
Learn to Exploit and Expand Access into Remote Networks through Windows and Become a Proficient Cyber Defender
- Use the Browser Exploitation Framework (BeEF) to control clients
- Deploy and control an IRC based botnet
- Learn Windows 7 security bypass techniques
Windows Exploitation & Analysis (WEA) is a proficiency-based course that teaches the essentials of offensive methodology and analysis with a focus on Windows systems and using modern techniques.
WEA is for people who love network and computer security, programmers, and people who are responsible for protecting their organizations’ networks from threats. This course gives you an in-depth look at the essentials of remote network exploitation, from scanning and enumeration of a network space, down to performing client-side attacks, which are quickly becoming the most reliable vector into target networks.
At the start of the course, you’ll be introduced to the Offensive Methodology and Information Gathering using open source tools.
SCANNING & ENUMERATION
As the course moves on, you’ll get comfortable with using open source tools to scan networks and servers.
We’ll teach you to send exploits using the Metasploit Framework (MSF), use advanced tunneling for custom tunneling executables, pivot using Metasploit and SOCKS proxy tunnels. You’ll also compile and deploy actual malware to set up a small botnet using client-side exploits.
In this phase, you will learn about the Windows Registry, Offensive Digital Forensics, and Windows Activity Directory queries. You’ll use open source and native tools to find files of interest, how to crack passwords, and use the pass-the-hash technique to move around a remote Windows network.
By the end of the course, you’ll be using open source tools to detect and evade antivirus tools and Intrusion Detection Systems.
WEA (Single Seat)
- Included: Parrot Labs Course Textbook
- Included: Robust Sandbox Network
- Course Length: 5 Days
Additional group and government discounts available, just email us.
What will you get out of this course?
Granting you proficiency-based hands-on training using a variety of tools to gain access to a remote network, WEA will teach you in-depth the tactics, techniques and procedures an attacker may use to gain access to your organization and its networks.
What makes this course unique?
You’ll perform your exercises and scenarios in a sandboxed network, allowing you to practice and learn at your own pace without affecting other students.