• ATTENDEE
    • Registration
    • Safety
    • Code of Conduct
  • IN-PERSON
    • Keynotes
    • Briefings
    • Workshops
    • Speakers
    • Sponsors
  • VILLAGES
    • Villages
    • Contests
    • Austin
    • Code of Conduct
  • SPONSORS
    • Our Sponsors
    • Business Hall
    • Become a Sponsor
    • Our Mission
  • ABOUT
    • Call For Everything
    • Discord
    • CPE Credit
    • Privacy Policy
  • Code of Conduct
Log In
All Sessions
Speakers

Penetration Testing for Systems and Network Admins

  • Workshop Starts: Thursday, September 22, 2022 1:00 pm
  • Workshop End: Thursday, September 22, 2022 5:00 pm
  • Workshop: Pentesting
  • Technology: Pentration Testing
  • Company: Blue Bastion
  • Seats: 75
  • Audience: Beginner to Intermediate
  • Floor: Floor 1 - Room 3
  • Room: Floor 1 - Room 3
  • Location: Floor 1 - Room 3
  • Briefing Type: 2hr Hands-On Workshop

Tech: 

  • Applied Security |
  • Pentesting |
  • Red Team
Penetration Testing for Systems and Network Admins
The objective of this Capture-the-Flag style class is to take students with existing networks or systems administration experience and teach them how to:
1. Perform a comprehensive penetration test against Active Directory environments.
2. Spot a bad penetration test.
We understand that not everyone taking a pen test class will want to be a penetration tester. Hence, we have organized this class to be a well-rounded experience, allowing both aspiring red teamers and blue teamers to get the most out of it. This class will provide students with hands-on experience with all phases of a penetration test, from information gathering to reporting.

An introductory penetration testing class like this will only be beneficial to students who intimately know computer networking and have Windows administration experience. Existing experience with Windows command line, Linux administration, and Active Directory is highly recommended. For example, students should know how a packet traverses from point A to point B on the OSI model, how to manage users in Active Directory, and what HTTP GET and POST requests look like. Students should be comfortable with the Linux command line as our primary attack host will be Linux-based.

Students should bring there own laptop capable of running a Kali Linux VM and connecting to a wireless network. A VirtualBox image of customized Kali Linux will be provided. Instructors will not provide support for VMWare, Parallels, Hyper-V, or other virtualization platforms.

Lab connectivity guide and Kali Linux image will be provided to students a week before the class.

Speaker:

Qasim Ijaz

Privacy  |  Disclaimer

© 2021 TexasCyber, All Rights Reserved.

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.