applied security conferences and training: CanSecWest | PacSec | EUSecWest |

Security Masters Dojo

Advanced and intermediate security training and technology enhancement for information security professionals.

CanSecWest: Security Masters Dojo Vancouver

Offensive PowerShell for Red and Blue Teams

Register for the March 10-11, 2-day course

Nikhil Mittal

Penetration Tests and Red Team operations for secured environments need altered approaches. You cannot afford to touch disk, throw executables, and use memory corruption exploits without the risk of being ineffective as a simulated adversary. To enhance your offensive tactics and methodologies, PowerShell is the tool of choice.

PowerShell has changed the way Windows networks are attacked. It’s Microsoft’s shell and scripting language, available by default in all modern Windows computers. It could interact with .Net, WMI, COM, Windows API, Registry and other computers on a Windows Domain. This makes it imperative for Penetration Testers and Red Teamers to learn PowerShell.

This training is aimed towards attacking Windows network using PowerShell and is based on real world penetration tests and Red Team engagements for highly secured environments. The course runs as a penetration test of a secure environment with detailed discussion and use of custom PowerShell scripts in each phase.

The course is a mixture of demonstrations, exercises, hands-on and lecture. The training focuses more on methodology and techniques than tools. Attendees will get free one-month access to a complete Windows environment after the training. Attendees would be able to write their own scripts and customize existing ones for security testing after this training. This training aims to change how you test a Windows based environment.

Learning Objectives

Some of the techniques, implemented using PowerShell, used in the course will be:

You will also receive one-month access to the online lab, solutions to exercises, sample source code, Lab manual, updated tools and extra slides explaining things which could not be covered.

The attendees will learn a powerful attack method which could be applied from day one after the training, and will understand that it is not always required to use third party executables, non-native code or memory corruption exploits on the targets.

The attendees would learn how PowerShell reduces dependence on existing frameworks – yet seamlessly integrates with them.

PREREQUISITE WARNING Each class has prerequisites for software loads and a laptop is mandatory. These individual class guides will list material the students are expected have knowledge about coming in and software tools that need to be pre-installed before attending so you get the maximum benefit from the focused intermediate or advanced level course. Please pay particular attention to the prerequisites, as the material listed there will not be reviewed in the courses, and will be necessary to get the maximum benefit out of these educational programs.

Course Outline:

Day1 – PowerShell essentials and getting a foothold Day 2 – Post exploitation and lateral movement


System Requirements

System with 4 GB RAM and ability to install OpenVPN client and RDP to Windows boxes.