What You Need to Know Before
You Start
Starts 8 June 2025 16:29
Ends 8 June 2025
00
days
00
hours
00
minutes
00
seconds
59 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Explore tactical post-exploitation techniques with Carlos Perez, covering advanced strategies for penetration testing and security assessment after initial system compromise.
Syllabus
- Introduction to Post-Exploitation
- Setting Up the Environment
- Maintaining Access
- Privilege Escalation
- Lateral Movement
- Data Exfiltration Techniques
- Evasion and Defense Bypass
- Advanced Post-Exploitation Tools
- Real-World Scenarios and Case Studies
- Ethical and Legal Considerations
- Final Project and Assessment
Understanding the Post-Exploitation Phase
Objectives and Goals of Post-Exploitation
Tools and Resources Required
Lab Configuration and Management
Persistence Techniques and Mechanisms
Avoiding Detection and Maintaining Stealth
Identifying and Exploiting Weaknesses in Local Security
Leveraging Windows and Linux Privilege Escalation Strategies
Network Reconnaissance and Mapping
Exploiting Trust Relationships
Credential Harvesting and Reuse
Identifying Valuable Targets and Data
Covert Data Transfer Methods
Anti-Forensics Techniques
Bypassing Modern Defense Mechanisms and Tools
In-Depth Analysis of Popular Tools (e.g., Metasploit, Cobalt Strike)
Custom Scripting and Tool Development
Analyzing Past Incidents and Exploitations
Applying Tactics to Hypothetical Scenarios
Adhering to Legal Standards and Ethical Guidelines
Reporting and Documentation Best Practices
Comprehensive Scenario-Based Assessment
Documentation and Presentation of Findings
Subjects
Conference Talks