YoVDO

Assumed Breach - A Better Model for Penetration Testing

Offered By: YouTube

Tags

DerbyCon Courses Cybersecurity Courses Penetration Testing Courses Active Directory Courses Lateral Movement Courses Kerberoasting Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore an innovative approach to penetration testing in this conference talk from Derbycon 2019. Delve into the concept of "Assumed Breach" as Mike Saunders challenges traditional pen testing methods and advocates for a more realistic model. Learn about real-world tactics, including domain fronting, initial access techniques, and lateral movement strategies. Discover methods for finding accounts, Kerberoasting, mining Active Directory, and hunting for GPP credentials. Gain insights on trawling files and shares, hunting sessions, and leveraging PowerShell in penetration testing scenarios. Examine the pros and cons of this approach and understand how it can provide a more accurate assessment of an organization's security posture.

Syllabus

Intro
Pen Testing is BROKEN
I WANT A RED TEAM
ASSUMED WHAT?
Compromised USER
AV/EDR - DISABLED?
MALICIOUS USER
REAL WORLD TACTICS
ASSUMED BREACH TACTICS
DOMAIN FRONTING
INITIAL ACCESS
FINDING ACCOUNTS
KERBEROASTING
MINING AD
HUNTING GPP CREDS
LATERAL MOVEMENT
TRAWLING FILES/SHARES
HUNTING SESSIONS
BYO POWERSHELL
PROS & CONS
SUMMARY
QUESTIONS?


Related Courses

Privilege Escalation with Rubeus
Pluralsight
OS Analysis with HELK
Pluralsight
Active Directory Attacks Series
YouTube
Kerberoasting and Domain Accounts
Cybrary
Zero to Hero - MS17-010-EternalBlue, GPP-cPasswords, and Kerberoasting
Cyber Mentor via YouTube