Advanced Infrastructure Hacking (HPAIH)

This class continues the Art of Web Hacking series The class covers a wide range of offensive hacking techniques. The curriculum was written by real penetration testers with a world-wide reputation (BlackHat, AppSec, OWASP, Defcon). The Advanced Infrastructure Hacking class is designed for those who want to enrich their knowledge.
The fast-paced class teaches:
  • Hacking techniques to compromise operating systems and networking devices
  • Advanced penetration techniques to achieve exploitation
  • Hacking domain controllers to local root, VLAN hopping and VoIP hacking
Understanding Advanced Hacking techniques for infrastructure devices and systems, is critical for penetration testing, red teaming, and managing vulnerabilities in your environment. Students will become familiar with hacking techniques for common operating systems and networking devices. Experience with common hacking tools such as Metaspoit is recommended, but not a requirement.
Course Outline
Day 1
IPv4 and IPv6 refresher
  • Advanced topics in network scanning
  • Undertanding and exploiting IPv6 targets
  • OSINT, DVCS exploitation
  • Advanced OSINT data gathering
  • Exploiting git and continuous integration (CI) servers
Database servers
  • MySQL
  • Postgres
  • Oracle
Recent vulnerabilities
  • Heart-Bleed and Shell-Shock
  • PHP serialization exploit
  • Web-sphere Java exploits
Day 2
Windows exploitation
  • Domain and user enumeration
  • AppLocker/GPO restriction bypass
  • Local privilege escalation
  • Post exploitation #1 (AMSI bypass & Mimikatz)
  • Post exploitation #2 (LSASecrets)
Day 3
AD exploitation
  • Active Directory delegation issues
  • WOW64
  • Pivoting and WinRM
  • Persistence (Golden Ticket and DCSync)
  • Lateral movement using WMIC
Day 4
Linux exploitation
  • Port scanning and enumeration
  • FS + SSH
  • Privilege escalation
  • Rservices
  • Apache
  • X11 services
Day 5
Container breakout
  • Docker breakout
VLAN exploitation
  • VLAN concepts
  • VLAN hopping attacks
VPN exploitation
  • VPN
VoIP exploitation
  • VoIP enumeration
  • VoIP exploitation