Take advantage of spring savings with up to 50% off ILT training.

Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

PEN-300 – Advanced Evasion Techniques and Breaching Defenses

OffSec PEN-300 – Advanced Evasion Techniques and Breaching Defenses

Building on the skills acquired in PEN-200, OffSec’s PEN-300 5-days course explores advanced penetration testing techniques against hardened targets. Learners gain hands-on experience bypassing security defenses and crafting custom exploits in real-world scenarios, enhancing their expertise in ethical hacking and vulnerability assessments.

This course culminates in a challenging exam, leading to the OffSec Experienced Penetration Tester (OSEP) certification. Achieving the OSEP certification distinguishes professionals with advanced penetration testing skills, making them highly sought-after experts in securing organizations from sophisticated threats.

GK# 840105 Vendor# PEN-300
Vendor Credits:
No matching courses available.
Start learning as soon as today! Click Add To Cart to continue shopping or Buy Now to check out immediately.
Access Period:
Scheduling a custom training event for your team is fast and easy! Click here to get started.

Who Should Attend?

The PEN-300 course is ideal for experienced penetration testers and security professionals seeking to master advanced penetration testing methodologies, ultimately earning the OSEP certification.

What You'll Learn

Upon completing PEN-300 and successfully passing the OSEP exam, you’ll have mastered advanced penetration testing skills, including:

  • In-depth vulnerability analysis and exploitation
  • Custom exploit development
  • Bypassing modern security defenses
  • Exploiting authentication and authorization flaws
  • Attacking Active Directory and cloud environments
  • Post-exploitation techniques for maintaining access and escalating privileges

Course Outline

Evasion Techniques and Breaching Defenses: General Course Information

  • About the PEN-300 Course
  • Provided Material
  • Overall Strategies for Approaching the Course
  • About the PEN-300 VPN Labs
  • About the OSEP Exam

Operating System and Programming Theory

  • Programming Theory
  • Operating System and Programming Theory
  • Client-Side Code Execution with Office

Client-Side Code Execution with Office

  • Will You Be My Dropper
  • Phishing with Microsoft Office
  • Keeping Up Appearances
  • Executing Shellcode in Word Memory
  • PowerShell Shellcode Runner
  • Keep That PowerShell in Memory
  • Talking to the Proxy

Client-Side Code Execution with Windows Script Host

  • Creating a Basic Dropper in JScript
  • JScript and C#
  • In-memory PowerShell Revisited

Process Injection and Migration

  • Finding a Home for Our Shellcode
  • DLL Injection
  • Reflective DLL Injection
  • Process Hollowing

Introduction to Antivirus Evasion

  • Antivirus Software Overview
  • Simulating the Target Environment
  • Locating Signatures in Files
  • Bypassing Antivirus with Metasploit
  • Bypassing Antivirus with C#
  • Messing with Our Behavior
  • Office Please Bypass Antivirus
  • Hiding PowerShell Inside VBA

Advanced Antivirus Evasion

  • Intel Architecture and Windows 10
  • Antimalware Scan Interface
  • Bypassing AMSI With Reflection in PowerShell
  • Wrecking AMSI in PowerShell
  • UAC Bypass vs Microsoft Defender
  • Bypassing AMSI in JScript

Application Whitelisting

  • Application Whitelisting Theory and Setup
  • Basic Bypasses
  • Bypassing AppLocker with PowerShell
  • Bypassing AppLocker with C#
  • Bypassing AppLocker with JScript

Bypassing Network Filters

  • DNS Filters
  • Web Proxies
  • IDS and IPS Sensors
  • Full Packet Capture Devices
  • HTTPS Inspection
  • Domain Fronting
  • DNS Tunneling

Linux Post-Exploitation

  • User Configuration Files
  • Bypassing AV
  • Shared Libraries

Kiosk Breakouts

  • Kiosk Enumeration
  • Command Execution
  • Post-Exploitation
  • Privilege Escalation
  • Windows Kiosk Breakout Techniques

Windows Credentials

  • Local Windows Credentials
  • Access Tokens
  • 3 Kerberos and Domain Credentials
  • Processing Credentials Offline

Windows Lateral Movement

  • Remote Desktop Protocol
  • Fileless Lateral Movement

Linux Lateral Movement

  • Lateral Movement with SSH
  • DevOps
  • Kerberos on Linux

Microsoft SQL Attacks

  • MS SQL in Active Directory
  • MS SQL Escalation
  • Linked SQL Servers

Active Directory Exploitation

  • AD Object Security Permissions
  • Kerberos Delegation
  • Active Directory Forest Theory
  • Burning Down the Forest
  • Going Beyond the Forest
  • Compromising an Additional Forest

Combining the Pieces

  • Enumeration and Shell
  • Attacking Delegation
  • Owning the Domain

Labs Outline

The Labs

  • Real Life Simulations
  • Wrapping Up

Prerequisites

While there are no formal certification prerequisites, a strong understanding of operating systems, networking, and scripting (e.g., Python, Bash) is highly recommended. Additionally, familiarity with the concepts and techniques covered in PEN-200 (Penetration Testing with Kali Linux) is highly recommended for success in this course.

Related Certifications

The OffSec Experienced Penetration Tester (OSEP) certification distinguishes professionals with advanced penetration testing skills, making them highly sought-after experts in securing organizations from sophisticated threats. The OffSec Experienced Penetration Tester (OSEP) exam is a challenging, proctored 48-hour assessment designed to evaluate your advanced penetration testing skills in a real-world environment. You’ll demonstrate your ability to identify, exploit, and report on vulnerabilities, culminating in the development of custom exploits.

OffSec Experienced Penetration Testers (OSEPs) have the skills and expertise necessary to conduct penetration tests against hardened systems. They’ve proven their ability to identify more impactful intrusion opportunities and execute advanced, organized attacks in a controlled and focused manner.