Contact Us

Course Summary – 4 Day Offering

As organizations scramble for a way to keep from becoming the next breach headline, they’ve begun looking for ways to simulate the sophisticated attackers they now face. Organizations that have started to adopt an “assume breach” mentality understand that it’s not a matter of if they’re compromised by these advanced adversaries, but when. The best way to test modern environments against these more advanced threats is with a Red Team that leverages the same Tactics, Techniques and Procedures (TTPs) as the adversaries themselves. If you want to learn how to perform Red Team operations, sharpen your technical skillset, or understand how to defend against modern adversary tradecraft, Adversary Tactics: Red Team Ops is the course for you.

This intensive course immerses students in a simulated enterprise environment, with multiple domains, up-to-date and patched operating systems, modern defenses, and active network defenders responding to Red Team activities. We will cover all phases of a Red Team engagement in depth: advanced attack infrastructure setup and maintenance, user profiling and phishing, host enumeration and “safety checks”, advanced lateral movement, sophisticated Active Directory domain enumeration and escalation, persistence (userland, elevated, and domain flavors), advanced Kerberos attacks, data mining, and exfiltration.

A focus will be placed on “offense-in-depth,” the ability to rapidly adapt to defensive mitigations and responses with a variety of offensive tactics and techniques. To drive this concept home, students will go up against live incident responders that will actively hunt for and block malicious activity in the environment. The responders will provide real-time feedback to students to demonstrate what artifacts attackers can leave behind, and how students can adapt their tradecraft to minimize their footprint. Come learn to use some of the most well-known offensive tools from the authors themselves, including co-creators and developers of PowerView, PowerShell Empire, PowerSploit, PowerUp, and BloodHound.

Day 1
  • Red Team Philosophy/Overview Engagement Management
  • Covert Infrastructure Deep Dive - Setup, Protection, Maintenance
  • Initial External Reconnaissance and OSINT
  • “Offense-in-Depth”
  • Evading Network Detections and Active Incident Responders (“hunting”)
Day 2
  • Initial Access
  • Host Triage and Offensive “Safety Checks”
  • Detection and Evasion of Host-Based Defenses
  • Maintaining Your Foothold (short vs. long term and userland vs. elevated persistence strategies)
  • Privilege Escalation Methods Through Abuse of Misconfigurations
Day 3
  • User and Network Resource Mining
  • Credential Abuse
  • Active Directory Enumeration and Abuse - Intelligence Gathering, Domain Escalation, Covert Persistence, and BloodHound
  • Pivoting Through the Target Network
  • SQL Abuse
Day 4
  • Kerberos Attacks in Depth
  • Providing Value to the Client
  • Blue Team Training Objectives
  • Data Movement and External Exfiltration
  • Kerberos Attacks in Depth
  • Complete Lab Debrief

Private Onsite Training

If a public offering of the training classes does not fit your busy schedule, our team of experts are available to provide a private training offering to your organization. This is by far the best way for your team to get one on one access to the instructors and solidify the material. We provide all training material as well as laptops and classroom locations if needed.

Ready To Get Started?