Cyber Range - Red Team
Course Overview:
This course introduces participants to principles of cyber security from the attacker’s perspective. Participants will learn the different stages of attack, a variety of attack tools and how to exploit an enterprise network using different attack vectors.
Duration:
Half day
Goals:
Familiarise participants with different attack technologies, common attack types and how such attacks can be mitigated.
Target Audience:
Anyone interested to move into the cyber security industry & cyber security professionals looking to sharpen their skills.
Prerequisites:
- Basic knowledge of networking concepts
- Basic Linux knowledge
Session Overview:
- Introduction to Linux and basic networking concepts - optional
- Getting familiar with the Linux command line
- Reconnaissance of target network
- Attacking a Windows Environment
- Vulnerability identification
- Vulnerability exploitation – using the Metasploit framework
- Post exploitation activities – password cracking, pivoting
- Find and capture flags in compromised machines
- Attacking a web server
- Information gathering – wpscan, dirb
- Gaining unauthorised access to website accounts – password cracking
- Server access - open source reverse shell code
- Privilege escalation
- Become root user - password cracking
Course Overview:
This course introduces participants to denial of service concepts, networking theory and packet crafting tools. Participants will use these tools to degrade the service offered by a target’s infrastructure.
Duration:
Half day
Goals:
Familiarise participants with denial of service concepts and how denial of service attacks can be performed through hands-on experience. To give participants a better understanding of how such attacks can be mitigated.
Target Audience:
Anyone interested to move into the cyber security industry & cyber security professionals looking to sharpen their skills.
Prerequisites:
- Basic knowledge of networking concepts
- Basic Linux knowledge
Session Overview:
- Introduction to Linux and basic networking concepts - optional
- Reconnaissance of target network
- Introduction to Denial of Service theory
- Learn network packet theory
- Use packet crafting tools – hping3
- Monitor network traffic – Wireshark
- Perform SYN-Flood attack
- Introduction to SYN-Flood DoS attack
- Use new knowledge to perform a SYN-Flood attack
- Verify effectiveness of attack
- Perform DDoS SYN-Flood attack
- Introduction to Distributed Denial of Service concepts
- Exploit backdoor – netcat
- Perform port scan – nmap
- Perform DDoS attack
- Verify effectiveness of attack
- Perform ICMP-Flood attack