Module 1 Attacker Methodology
The Network as a Whole
-
Gain a basic understanding of an enterprise network's DMZ
-
Learn about deployment environments
-
Understand the difference between core and edge network devices
-
Study virtual private networks and remote sites
The Lockheed-Martin Cyber Kill-Chain
-
Learn the parts of the Lockheed-Martin Cyber Kill-Chain
-
Apply the Kill-Chain to malware that performed cryptomining
-
Apply the Kill-Chain to three iterations of ransomware
MITRE ATT&CK Framework
-
Learn the classifications of the MITRE ATT&CK Framework
-
Review a case study of OilRig campaigns with MITRE ATT&CK principles
-
Review a case study of APT3 campaigns with MITRE ATT&CK principles
-
Review a case study of APT28 campaigns with MITRE ATT&CK principles
Module 2 Windows Endpoint Introduction
Windows Processes
-
Gain a basic understanding of programs running within Windows
-
Learn about Windows Services and their relationship with processes
-
Review the common states of Windows Services
Windows Registry
-
Review the configuration structure of theWindows Registry
-
Learn about the key-value pair relationship within the Windows Registry
-
Understand the value types and formats for Windows Registry keys
Command Prompt, VBScript, and PowerShell
-
Review the non-graphical means of interacting with Windows
-
Build batch scripts used for the command prompt to run local commands
-
Write a Visual Basic Script for collecting operating system
-
Build custom PowerShell functions
Programming on Windows
-
Review the Component Object Model in Windows
-
Learn about the development of the .NET Framework and .NET Core
Windows Event Log
-
Gain a basic understanding of Windows Event logs and sources
-
Review several Windows Event logs using the Windows Event Viewer
-
Use PowerShell to query Windows Event logs
Empowering the Logs
-
Gain a basic understanding of System Monitor Sysmon)
-
Review Sysmon events using the Windows Event Viewer
-
Review Sysmon events using PowerShell
-
Use PowerShell Core in Kali Linux to query event logs remotely
Module 3 Windows Server Side Attacks
Credential Abuse
-
Learn about the Windows Security Account Manager
-
Learn about Windows Authentication
-
Understand the concept of suspicious login activity
-
Evaluate the behavior of brute-force login activity
Web Application Attacks
-
Learn about the configuration of Internet Information Services IIS in Windows
-
Evaluate logging artifacts of local file inclusion for attacking web servers
-
Evaluate logging artifacts of command injection and file upload for attacking web servers
Binary Exploitation
-
Learn about binary attacks through buffer overflows, and the artifacts they create
-
Study the use of Windows Defender Exploit Guard and how it protects against binary exploitation
-
Evaluate logging artifacts generated by the Windows Defender Exploit Guard
Module 4 Windows Client Side Attacks
Attacking Microsoft Office
-
Review social engineering and spearphishing techniques
-
Evaluate the use of Microsoft Office products to deploy phishing attacks
-
Review logging artifacts generated from a phishing attack
Monitoring Windows PowerShell
-
Gain a basic understanding of extended PowerShell logging capabilities
-
Understand the use of PowerShell module logging
-
Understand the use of PowerShell script block logging
-
Understand the use of PowerShell transcription
-
Review PowerShell logging artifacts generated from a phishing attack
-
Learn about PowerShell obfuscation and deobfuscation
Module 5 Windows Privilege Escalation
Privilege Escalation Introduction
-
Gain a basic understanding of Windows integrity levels and enumeration
-
Learn about Windows’ User Account Control UAC
-
Evaluate a UAC bypass technique and the logging artifacts it creates
Escalations to SYSTEM
-
Perform an elevation using UAC Bypass and review the logging artifacts created
-
Learn about service permissions for privilege escalation along with relevant logging artifacts
-
Learn about unquoted service paths for privilege escalation along with logging artifacts
Module 6 Linux Endpoint Introduction
Linux Applications and Daemons
-
Understand what Linux daemons are
-
Understand the Syslog Framework components
-
Understand how the syslog and the journal daemon work together
-
Understand Linux web logging
Automating the Defensive Analysis
-
Understand how scripting can aid log analysis
-
Understand how to scale further scripting with DevOps tools
-
Understand how to put together what we learned in a real-life hunting scenario
Module 7 Linux Server-Side Attacks
Credential Abuse
-
Understand suspicious logins and how to detect them in logs
-
Understand brute-force password attacks and their log footprints
Web Application Attacks
-
Understand command injection attacks and their log footprint and detections
-
Understand SQL injection attacks and their log footprint and detections
Module 8 Linux Privilege Escalation
User-side privilege escalation attack detections
-
Understand how Linux privileges works
-
Understand how to detect privilege escalation attacks on user's configuration files
System-side privilege escalation attack detections
-
Understand how Linux privileges works
-
Understand how to detect privilege escalation attacks on user's configuration files
Module 9 Windows Persistence
Persistence on Disk
-
Understand and recognize Persisting via Windows Service
-
Understand and recognize Persisting via Scheduled Tasks
-
Understand and recognize Persisting by DLLSideloading/Hijacking
Persistence in Registry
-
Understand Using Run Keys
-
Understand Using Winlogon Helper
Module 10 Network Detections
Intrusion Detection Systems
-
Understand theory and methodologies behind IPS and IDS
-
Understand Snort rule syntax
-
Learn how to craft basic Snort rules
Detecting Attacks
-
Learn how to detect known vulnerabilities with Snort rules
-
Learn how to detect novel vulnerabilities with Snort rules
Detecting C2 Infrastructure
-
Understand the components of a C2 framework
-
Learn how to detect a well-known C2 communication through Snort rule sets
Module 11 Antivirus Detections
Antivirus Basics
-
Understand an Overview of Antivirus
-
Understand Signature-Based Detection
-
Understand Heuristic and Behavioral-Based Detection
Antimalware Scan Interface AMSI
-
Understand the basics of AMSI
-
Understand how attackers bypass AMSI
Active Directory Enumeration
Abusing Lightweight Directory Access Protocol
-
Understand LDAP
-
Interact with LDAP
-
Enumerate Active Directory with PowerView
Detecting Active Directory Enumeration
-
Audit Object Access
-
Perform Baseline Monitoring
-
Use Honey Tokens
Module 12 Network Evasion and Tunneling
Network Segmentation
-
Understand the concept of network segmentation
-
Learn the benefits of network segmentation
-
Understand possible methods of implementing network segmentation in an enterprise
Detecting Egress Busting
-
Understanding the concept of egress filtering
-
Understanding an iptables firewall setup and application of egress filtering
-
Evaluate an 'egress busting' technique and the logging artifacts it creates
Port Forwarding and Tunneling
-
Understand the concept of tunneling and port forwarding
-
Learn how attackers use it to compromise additional machines in the network
-
Understand the possible methods and tools attackers use to tunnel into the network and how to detect them
Module 13 Windows Lateral Movement
Windows Authentication
-
Understanding Pass the Hash
-
Understanding Brute Forcing Domain Credentials
-
Understanding Terminal Services
Abusing Kerberos Tickets
-
Understanding Pass the Ticket
-
Understanding Kerberoasting
Active Directory Persistence
Keeping Domain Access
-
Understanding Domain Group Memberships
-
Understanding Domain User Modifications
-
Understanding Golden Tickets
Module 14 SIEM Part One: Intro to ELK
Log Management Introduction
-
Understand SIEM Concepts
-
Learn about the ELK Stack
-
Use ELK Integrations with OSQuery
ELK Security
-
Understand Rules and Alerts
-
Understand Timelines and Cases
Module 15 SIEM Part Two: Combining the Logs
Phase One: Web Server Initial Access
-
Detect enumeration and command injection
-
Implement Phase One detection rules
Phase Two: Lateral Movement to Application Server
-
Discover brute forcing and authentication
-
Create Phase Two detection rules
Phase Three: Persistence and Privilege Escalation on Application Server
-
Understand persistence and privilege escalation
-
Build Phase Three detection rules
Phase Four: Perform Actions on the Domain Controller
-
Identify dumping the AD database
-
Create Phase Four detection rules