Evasion Techniques and Breaching Defenses: Offensive Security
Evasion Techniques and Breaching Defenses: Offensive Security
Evasion Techniques and Breaching Defenses: Offensive Security
Table of Contents
1 Evasion Techniques and Breaching Defenses: General Course Information
1.1 About The PEN-300 Course
1.2 Provided Material
1.2.1 PEN-300 Course Materials
1.2.2 Access to the Internal VPN Lab Network
1.2.3 The Offensive Security Student Forum
1.2.4 Live Support and RocketChat
1.2.5 OSEP Exam Attempt
1.3 Overall Strategies for Approaching the Course
1.3.1 Welcome and Course Information Emails
1.3.2 Course Materials
1.3.3 Course Exercises
1.4 About the PEN-300 VPN Labs
1.4.1 Control Panel
1.4.2 Reverts
1.4.3 Client Machines
1.4.4 Kali Virtual Machine
1.4.5 Lab Behavior and Lab Restrictions
1.5 About the OSEP Exam
1.6 Wrapping Up
2 Operating System and Programming Theory
2.1 Programming Theory
2.1.1 Programming Language Level
2.1.2 Programming Concepts
2.2 Windows Concepts
2.2.1 Windows On Windows
2.2.2 Win32 APIs
2.2.3 Windows Registry
2.3 Wrapping Up
3 Client Side Code Execution With Office
3.1 Will You Be My Dropper
3.1.1 Staged vs Non-staged Payloads
3.1.2 Building Our Droppers
3.1.3 HTML Smuggling
14.4 Wrapping Up
15 Microsoft SQL Attacks
15.1 MS SQL in Active Directory
15.1.1 MS SQL Enumeration
15.1.2 MS SQL Authentication
15.1.3 UNC Path Injection
15.1.4 Relay My Hash
15.2 MS SQL Escalation
15.2.1 Privilege Escalation
15.2.2 Getting Code Execution
15.2.3 Custom Assemblies
15.3 Linked SQL Servers
15.3.1 Follow the Link
15.3.2 Come Home To Me
15.4 Wrapping Up
16 Active Directory Exploitation
16.1 AD Object Security Permissions
16.1.1 Object Permission Theory
16.1.2 Abusing GenericAll
16.1.3 Abusing WriteDACL
16.2 Kerberos Delegation
16.2.1 Unconstrained Delegation
16.2.2 I Am a Domain Controller
16.2.3 Constrained Delegation
16.2.4 Resource-Based Constrained Delegation
16.3 Active Directory Forest Theory
16.3.1 Active Directory Trust in a Forest
16.3.2 Enumeration in the Forest
16.4 Burning Down the Forest
16.4.1 Owning the Forest with Extra SIDs
16.4.2 Owning the Forest with Printers
16.5 Going Beyond the Forest
16.5.1 Active Directory Trust Between Forests
16.5.2 Enumeration Beyond the Forest
16.6 Compromising an Additional Forest