– Target Scoping and Mapping the Attack Surface
– ASN ID, IP Lookups, Allocated IP Range Extraction, IP History
– Subdomain Enumeration
– Organization’s Social Media
– Employee(s) Profiling
– Identifying Organizations Associations
– Acquisitions, Mergers, Vendors, Customers etc.
– Hunting Code Repositories, Dark Web, Paste(s) and Leaked Data
– Cloud Recon
– Art of Making Notes
– Enriching OSINT Data
– Generating Username/Password Patterns
– Bucket/Spaces Pattern Generation
– Tech Stack Profiling
– Capturing Screenshots of Exposed Services
– Port Scanning (Active/Passive)
– Identifying SSO/Login/Admin/VPN Portal(s)
– Breached Databases
– Metadata Extraction
– Automating CSE for Dork Matching
– Identifying and Prioritizing Targets
– Attacking and Exploitation
– Targeted Credential Spraying
– Compromising (BCI)
– Attacking and Exploitation Continued…
– Attacking Network Services using collated data
– Stealing information from Buckets/Blobs
– Compromising Cloud Server Instances
– Discovering and Exploiting Hidden Injection Points
– Compromising Federation Servers/Domain Controller Servers
– Mapping Forest Environment
– Exploiting Domain Trust to Identify New Input Vector (Users) for Further OSINT
– Exploring Human Attack Surface
– Attack Planning: Compromise the Unreachable Domain
– Practical Social Engineering
– User Profiling
– Watering Hole Attack
– Spear Phishing and Targeted Client Side Exploitation
– Dropping Payloads using BCI
– Post Exploitation & Persistence
– Privilege Escalation in Windows Environment
– Dumping Privileged User Credentials
– Compromising AD and Network Persistence
Date: 13th – 14th May, 2020
Duration: 2 Days
Venue: 800, Iberville St, New Orleans, LA 70113
Date: 13th – 14th May, 2020
Duration: 1 Day
Venue: Fluaderdale, USA
Date: 1st-2nd August, 2020 / 3rd-4th August, 2020
Duration: 2 Days (Twice)
Venue: Mandalay Bay, Las Vegas, USA