Windows Exploitation & Analysis (WEA)

Please call to register for this class.

Learn to Exploit and Expand Access into Remote Networks through Windows and Become a Proficient Cyber Defender

 

  • Use the Browser Exploitation Framework (BeEF) to control clients
  • Deploy and control an IRC based botnet
  • Learn Windows 7 security bypass techniques

 

Windows Exploitation & Analysis (WEA) is a proficiency-based course that teaches the essentials of offensive methodology and analysis with a focus on Windows systems and using modern techniques.

oma_methodology

WEA is for people who love network and computer security, programmers, and people who are responsible for protecting their organizations’ networks from threats. This course gives you an in-depth look at the essentials of remote network exploitation, from scanning and enumeration of a network space, down to performing client-side attacks, which are quickly becoming the most reliable vector into target networks.

NOTE: In this class you will use real exploits against simulated targets. There are simulated targets for a variety of operating systems, including modern versions with secure settings. For example, you will perform spear-phishing attacks against email addresses found in your scenario. Our remote target computers will check their email and open your exploit attachments and links. Parrot Labs Cyber Mission Training provides a persistent and secure training environment where you can learn and practice new skills at your own pace without affecting other students’ VMs.
Download Course Sheet

 

Topics

INFORMATION GATHERING

At the start of the course, you’ll be introduced to the Offensive Methodology and Information Gathering using open source tools.

SCANNING & ENUMERATION

As the course moves on, you’ll get comfortable with using open source tools to scan networks and servers.

GAINING ACCESS

We’ll teach you to send exploits using the Metasploit Framework (MSF), use advanced tunneling for custom tunneling executables, pivot using Metasploit and SOCKS proxy tunnels. You’ll also compile and deploy actual malware to set up a small botnet using client-side exploits.

EXPANDING ACCESS

In this phase, you will learn about the Windows Registry, Offensive Digital Forensics, and Windows Activity Directory queries. You’ll use open source and native tools to find files of interest, how to crack passwords, and use the pass-the-hash technique to move around a remote Windows network.

SUSTAINING ACCESS

By the end of the course, you’ll be using open source tools to detect and evade antivirus tools and Intrusion Detection Systems.

 

Cost

WEA (Single Seat)

$3750/each

  • Included: Parrot Labs Course Textbook
  • Included: Robust Sandbox Network
  • Course Length: 5 Days

Sign up

Additional group and government discounts available, just email us.

 

What will you get out of this course?

Granting you proficiency-based hands-on training using a variety of tools to gain access to a remote network, WEA will teach you in-depth the tactics, techniques and procedures an attacker may use to gain access to your organization and its networks.

What makes this course unique?

You’ll perform your exercises and scenarios in a sandboxed network, allowing you to practice and learn at your own pace without affecting other students.