More dates

Adversary Tactics: Identity-driven Offensive Tradecraft - SO-CON 2025 (In-person & Virtual; US Time)


Event description

As modern architecture increasingly shifts services and data from on-premises infrastructure to the cloud, Identity becomes the thread that ties everything together.

Our Adversary Tactics: Identity-driven Offensive Tradecraft course is a follow-on to our Adversary Tactics: Red Team Operations course and offers an in-depth look at identity-driven attacks, targeting both on-premises and hybrid identities. Participants will learn how to abuse the intricacies of different authentication and authorization mechanisms to traverse on-premises and cloud environments, gain access to integrated systems, and even cross tenants. Participants will also be equipped with a practical approach to identifying known attack paths and forging new ones within complex operational environments and across people, processes, and technology.

    Course Summary

    Modern ecosystems rely on Identity Providers (IdP) and Identity and Access Management (IAM) systems to authenticate users and govern access. Threat actors and red teams alike have been adopting and adapting “identity-driven” tradecraft to navigate modern environments and identity attack paths to their objectives. But what turns a path into an attack path? How do attackers discover new paths? And how do they abuse identity and access management platforms to execute attacks and impact the target?

    Adversary Tactics: Identity-driven Offensive Tradecraft equips participants with a method of discovering attack paths in complex environments, including previously disclosed techniques, as well as new attack primitives in common technology stacks and bespoke internal systems and processes. Participants will learn to identify and execute a wide range of elaborate attacks against both on-premises and cloud technologies. They will practice these skills hands-on in a specially designed lab environment that simulates a real-world client environment incorporating a variety of technologies and attack paths, including cross-tenant and supply chain attacks. Technologies covered include Kerberos, NTLM, ADCS, ADFS, SAML, Okta, Entra ID, OAuth, Azure, and hybrid identities.

    In typical SpecterOps fashion, “Red vs. Blue” discussions are incorporated into the lectures to provide participants with the defender’s perspective and detection logic, as well as OPSEC considerations to counter those. A defender will also actively “hunt” participants in the lab to push them to improve their tradecraft by making educated decisions.

    Course Syllabus

    Day 1

    • Attack Path Identification Methodology
    • Active Directory Situational Awareness
    • Active Directory Guided Attacks
    • Kerberos Delegation Abuse
    • NTLM Tradecraft
    • Authentication Coercion Techniques

    Day 2

    • Introduction to PKI, Active Directory Certificate Services, and PKINIT
    • Certificate Abuse Techniques and Shadow Credentials
    • Active Directory Federation Services, SSO, and SAML Attacks

    Day 3

    • Okta Deployment Scenarios
    • Okta Abuse for Lateral Movement and Privilege Escalation
    • SCCM Tradecraft and Hierarchy Takeover Techniques

    Day 4

    • Introduction to Entra ID and Azure Architecture
    • OAuth and OpenID Flows in Entra ID
    • Consent and Grant Flows
    • Token Abuse
    • Targeting Hybrid Environments
    • Cross-Tenant and Supply Chain Attacks

    Who Should Take This Course

    • Red teamers and penetration testers seeking to learn advanced tradecraft that works in mature environments.
    • Blue teamers seeking to gain insight into advanced tradecraft commonly used by advanced threat actors.
    • Security practitioners seeking to learn a methodic approach for identifying attack paths in complex systems or environments.


    SO-CON Training Benefits

    This course is a part of the SO-CON 2025 event. Attend the SO-CON 2025 conference for FREE by adding the SO-CON 2025 ticket to your training order!


    Stay tuned for announcements about more SO-CON training benefits!


    Participant Requirements

    Proficiency in the following:

    • Windows and Active Directory fundamentals
    • Operating through a C2 agent
    • Payload generation
    • Lateral movement techniques
    • Credential abuse on Windows systems

    Completion of the Adversary Tactics: Red Team Operators course is highly recommended but not strictly required.

    We recommend participants have at least two (2) years of practical experience.


    Hybrid (Virtual) Attendance

    If traveling to Arlington, VA isn't feasible, you can opt to take this course virtually online through Zoom. You will receive the same training portal access and watch the live instruction. However, the virtual training is not part of SO-CON - remote attendees will NOT receive any of the exclusive benefits that come with in-person training, including a free ticket to the SO-CON summit.
    Remote attendees will receive logistics emails and credentials the week before the trainings.

    FAQs

    How can I contact the organizer with any questions?

    Please email training@specterops.io with any questions.  

    What's the refund policy?

    Full refunds will be provided up to 7 days before the course start date.

    What are the hardware requirements for attending the course?

    Courses are based in the SpecterOps training portal and accessible via an internet connection; no VMs are required for labs. The following are recommended hardware requirements:

    • Internet Connection
    • 8GBs of RAM
    • Modern Web Browser capable of rendering HTML5

      Powered by

      Tickets for good, not greed Humanitix dedicates 100% of profits from booking fees to charity