More dates

Adversary Tactics: Identity-driven Offensive Tradecraft - October 2024 (In-person & Virtual; US Time)


Event description

This is a Hybrid event; participants can choose to join us in person in the Denver, Colorado area or virtually via Zoom. 

Early Bird Pricing - Take advantage of early bird pricing for this training, register by August 8, 2024 to receive 25% off your order during checkout!

New Follow-on to Adversary Tactics: Red Team Operations!

We're excited to announce the new red teaming course from SpecterOps: Identity-driven Offensive Tradecraft! The course is in active development, but take a peek below for a preview of the syllabus and to register for the inaugural delivery of the course in October 2024!

As modern architecture increasingly shifts services and data from on-premises infrastructure to the cloud, Identity becomes the thread that ties everything together.

Our Adversary Tactics: Identity-driven Offensive Tradecraft course is a follow-on to our Adversary Tactics: Red Team Operations course and offers an in-depth look at identity-driven attacks, targeting both on-premises and hybrid identities. Participants will learn how to abuse the intricacies of different authentication and authorization mechanisms to traverse on-premises and cloud environments, gain access to integrated systems, and even cross tenants. Participants will also be equipped with a practical approach to identifying known attack paths and forging new ones within complex operational environments and across people, processes, and technology.

    Course Summary

    Modern ecosystems rely on Identity Providers (IdP) and Identity and Access Management (IAM) systems to authenticate users and govern access. Threat actors and red teams alike have been adopting and adapting “identity-driven” tradecraft to navigate modern environments and identity attack paths to their objectives. But what turns a path into an attack path? How do attackers discover new paths? And how do they abuse identity and access management platforms to execute attacks and impact the target?

    Adversary Tactics: Identity-driven Offensive Tradecraft equips participants with a method of discovering attack paths in complex environments, including previously disclosed techniques, as well as new attack primitives in common technology stacks and bespoke internal systems and processes. Participants will learn to identify and execute a wide range of elaborate attacks against both on-premises and cloud technologies. They will practice these skills hands-on in a specially designed lab environment that simulates a real-world client environment incorporating a variety of technologies and attack paths, including cross-tenant and supply chain attacks. Technologies covered include Kerberos, NTLM, ADCS, ADFS, SAML, Okta, Entra ID, OAuth, Azure, and hybrid identities.

    In typical SpecterOps fashion, “Red vs. Blue” discussions are incorporated into the lectures to provide participants with the defender’s perspective and detection logic, as well as OPSEC considerations to counter those. A defender will also actively “hunt” participants in the lab to push them to improve their tradecraft by making educated decisions.

    Course Syllabus

    Day 1

    • Attack Path Identification Methodology
    • Active Directory Situational Awareness
    • Active Directory Guided Attacks
    • Kerberos Delegation Abuse
    • NTLM Tradecraft
    • Authentication Coercion Techniques

    Day 2

    • Introduction to PKI, Active Directory Certificate Services, and PKINIT
    • Certificate Abuse Techniques and Shadow Credentials
    • Active Directory Federation Services, SSO, and SAML Attacks

    Day 3

    • Okta Deployment Scenarios
    • Okta Abuse for Lateral Movement and Privilege Escalation
    • SCCM Tradecraft and Hierarchy Takeover Techniques

    Day 4

    • Introduction to Entra ID and Azure Architecture
    • OAuth and OpenID Flows in Entra ID
    • Consent and Grant Flows
    • Token Abuse
    • Targeting Hybrid Environments
    • Cross-Tenant and Supply Chain Attacks

    Who Should Take This Course

    • Red teamers and penetration testers seeking to learn advanced tradecraft that works in mature environments.
    • Blue teamers seeking to gain insight into advanced tradecraft commonly used by advanced threat actors.
    • Security practitioners seeking to learn a methodic approach for identifying attack paths in complex systems or environments.

    Participant Requirements

    Proficiency in the following:

    • Windows and Active Directory fundamentals
    • Operating through a C2 agent
    • Payload generation
    • Lateral movement techniques
    • Credential abuse on Windows systems

    Completion of the Adversary Tactics: Red Team Operators course is highly recommended but not strictly required.

    We recommend participants have at least two (2) years of practical experience.

    In-person Attendee Benefits

    We will announce exclusive benefits for in-person attendees soon! We highly encourage you to join us in person for the training if you can.

    FAQs

    How can I contact the organizer with any questions?

    Please email training@specterops.io with any questions.  

    What's the refund policy?

    Full refunds will be provided up to 7 days before the course start date.

    What are the hardware requirements for attending the course?

    Courses are based in the SpecterOps training portal and accessible via an internet connection; no VMs are required for labs. The following are recommended hardware requirements:

    • Internet Connection
    • 8GBs of RAM
    • Modern Web Browser capable of rendering HTML5

    Powered by

    Tickets for good, not greed Humanitix dedicates 100% of profits from booking fees to charity