Assumed Breach - A Better Model for Penetration Testing
Offered By: YouTube
Course Description
Overview
Explore an innovative approach to penetration testing in this conference talk from Derbycon 2019. Delve into the concept of "Assumed Breach" as Mike Saunders challenges traditional pen testing methods and advocates for a more realistic model. Learn about real-world tactics, including domain fronting, initial access techniques, and lateral movement strategies. Discover methods for finding accounts, Kerberoasting, mining Active Directory, and hunting for GPP credentials. Gain insights on trawling files and shares, hunting sessions, and leveraging PowerShell in penetration testing scenarios. Examine the pros and cons of this approach and understand how it can provide a more accurate assessment of an organization's security posture.
Syllabus
Intro
Pen Testing is BROKEN
I WANT A RED TEAM
ASSUMED WHAT?
Compromised USER
AV/EDR - DISABLED?
MALICIOUS USER
REAL WORLD TACTICS
ASSUMED BREACH TACTICS
DOMAIN FRONTING
INITIAL ACCESS
FINDING ACCOUNTS
KERBEROASTING
MINING AD
HUNTING GPP CREDS
LATERAL MOVEMENT
TRAWLING FILES/SHARES
HUNTING SESSIONS
BYO POWERSHELL
PROS & CONS
SUMMARY
QUESTIONS?
Related Courses
Enterprise Security FundamentalsMicrosoft via edX Red Team Ethical Hacking - Beginner
Udemy Active Directory Pentesting With Kali Linux - Red Team
Udemy Lateral Movement with CrackMapExec
Pluralsight Lateral Movement with Infection Monkey
Pluralsight