CSX Advanced Exploitation Course

Learn advanced tactics for penetration testing!

Difficulty: Advanced

CSF Domain: Detect

$360.00

Price represents the non member rate.

Buy now

Buy Now and Save 10%!

Cybersecurity Month Special! 10% off regular prices 1-30 November!

Description

The Cybersecurity Nexus (CSX) Advanced Exploitation Course (CAEC) provides students, who possess an in-depth understanding of penetration testing, a deeper understanding of traversing complex networks. Students will work with real systems in real environments and will leverage real exploitation and pivoting tools in a live environment. Upon completion, students will understand the how to successfully exploit and move through a number of hosts on a network. Continuing Professional Education (CPE) Credit Count: 16

Schedule

Lesson Pivoting and Tunneling

In this lesson, students will:

  • Learn about data redirection basics
  • Gain an understanding of different pivoting techniques

Lesson SSH Tunneling

In this lesson, students will:

  • Learn about SSH port forwarding
  • Pivot through an SSH tunnel
  • Exploit through an SSH tunnel
  • Pivot through multiple devices using SSH

Lab/Instructional SSH Tunnel Implementation

In this lab, students will:

  • Use Kali Linux to create SSH tunnels in order for a LAN machine to communicate with a DMZ server
  • Enumerate Services via an SSH tunnel
  • Exploit a device via an SSH tunnel

Lab/Instructional Multiple SSH Tunnel Exploitation Implementation

In this lab, students will:

  • Pivot through multiple devices using SSH tunnels
  • Enumerate services through multiple devices
  • Utilize Metasploit to exploit a remote system via multiple tunnels.

Lesson Metasploit PortProxy

In this lesson, students will:

  • Learn about the PortProxy Metasploit module
  • Interact with Meterpreter
  • Pivot through Windows hosts
  • Run exploits through PortProxy

Lab/Instructional Metasploit PortProxy Implementation

In this lab, students will:

  • Use PortProxy to establish multiple pivot points.
  • Redirect port scans to a target machine
  • Establish a backdoor on the target machine via pivot points

Lesson Meterpreter Autoroute Implementation

In this lesson, students will:

  • Learn about Meterpreters AutoRoute function.
  • Pivot using AutoRoute
  • Run exploits through AutoRoute

Lab/Instructional Autoroute Implementation

In this lab, students will:

  • Use metasploit to gain perimeter access.
  • Use AutoRoute to pivot through network.
  • Exploit through AutoRoute.

Lab/Instructional Interesting Searches

Students will learn how to conduct packet analysis to identify the types of searches which devices are executing on their network.

Lab/Challenge Network Assessment

Based on what students have learned, thus far, they are challenged to enumerate and pivot through multiple devices and networks in order to capture a flag from the target machine.

The Cybersecurity Nexus (CSX) Advanced Exploitation Course (CAEC) provides students, who possess an in-depth understanding of penetration testing, a deeper understanding of traversing complex networks. Students will work with real systems in real environments and will leverage real exploitation and pivoting tools in a live environment. Upon completion, students will understand the how to successfully exploit and move through a number of hosts on a network.

Continuing Professional Education (CPE) Credit Count: 16

Schedule

Lesson Pivoting and Tunneling

In this lesson, students will:

  • Learn about data redirection basics
  • Gain an understanding of different pivoting techniques

Lesson SSH Tunneling

In this lesson, students will:

  • Learn about SSH port forwarding
  • Pivot through an SSH tunnel
  • Exploit through an SSH tunnel
  • Pivot through multiple devices using SSH

Lab/Instructional SSH Tunnel Implementation

In this lab, students will:

  • Use Kali Linux to create SSH tunnels in order for a LAN machine to communicate with a DMZ server
  • Enumerate Services via an SSH tunnel
  • Exploit a device via an SSH tunnel

Lab/Instructional Multiple SSH Tunnel Exploitation Implementation

In this lab, students will:

  • Pivot through multiple devices using SSH tunnels
  • Enumerate services through multiple devices
  • Utilize Metasploit to exploit a remote system via multiple tunnels.

Lesson Metasploit PortProxy

In this lesson, students will:

  • Learn about the PortProxy Metasploit module
  • Interact with Meterpreter
  • Pivot through Windows hosts
  • Run exploits through PortProxy

Lab/Instructional Metasploit PortProxy Implementation

In this lab, students will:

  • Use PortProxy to establish multiple pivot points.
  • Redirect port scans to a target machine
  • Establish a backdoor on the target machine via pivot points

Lesson Meterpreter Autoroute Implementation

In this lesson, students will:

  • Learn about Meterpreters AutoRoute function.
  • Pivot using AutoRoute
  • Run exploits through AutoRoute

Lab/Instructional Autoroute Implementation

In this lab, students will:

  • Use metasploit to gain perimeter access.
  • Use AutoRoute to pivot through network.
  • Exploit through AutoRoute.

Lab/Instructional Interesting Searches

Students will learn how to conduct packet analysis to identify the types of searches which devices are executing on their network.

Lab/Challenge Network Assessment

Based on what students have learned, thus far, they are challenged to enumerate and pivot through multiple devices and networks in order to capture a flag from the target machine.