Assumed Breach - A Better Model for Penetration Testing
Offered By: YouTube
Course Description
Overview
Explore an innovative approach to penetration testing in this conference talk from Derbycon 2019. Delve into the concept of "Assumed Breach" as Mike Saunders challenges traditional pen testing methods and advocates for a more realistic model. Learn about real-world tactics, including domain fronting, initial access techniques, and lateral movement strategies. Discover methods for finding accounts, Kerberoasting, mining Active Directory, and hunting for GPP credentials. Gain insights on trawling files and shares, hunting sessions, and leveraging PowerShell in penetration testing scenarios. Examine the pros and cons of this approach and understand how it can provide a more accurate assessment of an organization's security posture.
Syllabus
Intro
Pen Testing is BROKEN
I WANT A RED TEAM
ASSUMED WHAT?
Compromised USER
AV/EDR - DISABLED?
MALICIOUS USER
REAL WORLD TACTICS
ASSUMED BREACH TACTICS
DOMAIN FRONTING
INITIAL ACCESS
FINDING ACCOUNTS
KERBEROASTING
MINING AD
HUNTING GPP CREDS
LATERAL MOVEMENT
TRAWLING FILES/SHARES
HUNTING SESSIONS
BYO POWERSHELL
PROS & CONS
SUMMARY
QUESTIONS?
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent