This Red Team Ops I training course, created by Zero-Point Security, provides you with the knowledge and skills necessary to excel in performing adversary simulation and emulation exercises with Cobalt Strike

Training Content 

1. Getting Started 

  • Welcome  
  • Introduction to Red Teaming  
  • Adversary Emulation vs Simulation  
  • The Attack Lifecycle 
  • Engagement Planning  

3. Malware Essentials 

  • Introduction 
  • Processes  
  • Process Injection  
  • .NET & P/Invoke

5. Defense Evasion

  • Introduction  
  • Compiled Artifacts  
  • Artifact Kit Demo  
  • Script Artifacts  
  • Beacon Memory  
  • Beacon Command Behavior  
  • Blending Post-ex  
  • Command-Line Detections  
  • Defense Evasion Lab 

7. Persistence 

  • Introduction  
  • Boot & Logon Autostart  
  • Logon Script 
  • PowerShell Profile  
  • Scheduled Task  
  • COM Hijacking  
  • Persistence Demo  
  • Persistence Lab 

9. Privilege Escalation

  • Introduction  
  • Path Interception  
  • Weak Service Permissions  
  • DLL Search Order Hijacking  
  • Software Vulnerabilities  
  • User Account Control 
  • Privilege Escalation Demo 
  • Privilege Escalation Lab 

11. Credential Access 

  • Introduction 
  • Credentials from Web Browsers  
  • Windows Credential Manager  
  • OS Credential Dumping  
  • Kerberos Tickets  
  • Credential Access Challenge 
  • Credential Access Solution 

13. Discovery

  • Introduction  
  • Lightweight Directory Access Protocol  
  • BOFHound  
  • Discovery Demo 
  • Discovery Lab 

15. Pivoting 

  • Introduction 
  • SOCKS Proxies  
  • SOCKS Demo  
  • SOCKS Lab 
  • Reverse Port Forwards  

17. Microsoft SQL Server 

  • Introduction  
  • Code Execution  
  • Linked Servers  
  • Privilege Escalation  
  • SQL Server Demo  
  • SQL Server Lab 

18. Domain Dominance 

  • DCSync  
  • Ticket Forgery  
  • DPAPI Backup Keys  

20. Forest & Domain Trusts 

  • Introduction  
  • Inter-Realm Tickets  
  • Parent-Child Trusts  
  • Parent-Child Trust Demo 
  • Parent-Child Trust Lab 
  • Inbound Trusts  
  • Inbound Trust Demo  
  • Inbound Trust Lab 
  • Outbound Trusts  
  • Outbound Trust Demo 
  • Outbound Trust Lab 

21. AppLocker 

  • Introduction  
  • Enumeration 
  • Bypasses  
  • AppLocker Challenge 

23. Course Completion 

  • Course Evaluation 3 questions 
  • Certificate of Course Completion 

2. Law & Compliance 

  • Introduction 
  • Computer Misuse Act  
  • Human Rights Act  
  • Data Protection Act & GDPR  
  • Sector Legislation  

4. Cobalt Strike Primer 

  • Introduction  
  • Listener Management  
  • Beacon Payloads 
  • Interacting with Beacon  
  • Cobalt Strike Lab 

6.  Initial Access 

  • Introduction  
  • Payloads  
  • Droppers  
  • Triggers  
  • Containers  
  • Delivery  
  • Initial Access Demo  
  • Initial Access Lab 

8. Post-Exploitation 

  • Session Passing  
  • File System  
  • Downloading Files  
  • Processes  
  • Keylogger  
  • Clipboard  
  • Registry  
  • Screenshots  
  • VNC  
  • Execution Commands  
  • Executing Custom Tools  

10. Elevated Persistence 

  • Scheduled Task  
  • Windows Service  
  • Windows Management Instrumentation  
  • Elevated Persistence Demo  
  • Elevated Persistence Lab 

12. User Impersonation 

  • Introduction  
  • Token Impersonation  
  • Pass the Hash  
  • Pass the Ticket  
  • Process Injection  
  • User Impersonation Demo  
  • User Impersonation Lab 

14. Lateral Movement 

  • Introduction  
  • Windows Remote Management  
  • PsExec  
  • Custom Techniques 
  • Leveraging LOLBAS  
  • Security Logon Types  
  • Lateral Movement Demo  
  • Lateral Movement Lab 

16. Kerberos 

  • Introduction  
  • Unconstrained Delegation  
  • Unconstrained Delegation Demo  
  • Unconstrained Delegation Lab 
  • Constrained Delegation  
  • Constrained Delegation Demo  
  • Constrained Delegation Lab 
  • Service Name Substitution 
  • Service Name Substitution Demo  
  • Service Name Substitution Lab 
  • S4U2self Computer Takeover  
  • S4U2self Demo 
  • S4U2self Lab 
  • Resource-Based Constrained Delegation  
  • Resource-Based Constrained Delegation Demo  
  • Resource-Based Constrained Delegation Lab 
  • Lateral Movement Services  
  • Kerberos Challenge 

19. Active Directory Certificate Services 

  • Introduction  
  • ESC1 – Misconfigured ‘Client Authentication’ Templates  
  • ESC1 Demo  
  • ESC1 Lab 
  • ESC3 – Misconfigured ‘Certificate Request Agent’ Templates 
  • ESC2 – Misconfigured ‘Any Purpose’ Templates  
  • ESC4 – Certificate Template Access Control  
  • ESC8 – NTLM Relay to ADCS HTTP Endpoints  
  • ESC8 Demo  
  • ESC8 Lab 
  • DPERSIST1 – Golden Certificates  
  • DPERSIST1 Demo  
  • DPERSIST1 Lab 

22. Reporting 

  • Reporting 

24. Final Exam 

  • Exam Information – READ THIS FIRST 04:21 
  • Red Team Operator Exam 
  • Red Team Operator Certificate 

PRODUCT SUMMARY

Key Features

  • Author: Daniel Duggan 
  • Level: Practitioner 
  • Study time: 20 hours 
  • Certification: Red Team Operator 

Ready to Get Started?