Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Assumed Breach - A Better Model for Penetration Testing

via YouTube

Overview

Explore an innovative approach to penetration testing in this conference talk from Derbycon 2019. Delve into the concept of "Assumed Breach" as Mike Saunders challenges traditional pen testing methods and advocates for a more realistic model. Learn about real-world tactics, including domain fronting, initial access techniques, and lateral movement strategies. Discover methods for finding accounts, Kerberoasting, mining Active Directory, and hunting for GPP credentials. Gain insights on trawling files and shares, hunting sessions, and leveraging PowerShell in penetration testing scenarios. Examine the pros and cons of this approach and understand how it can provide a more accurate assessment of an organization's security posture.

Syllabus

Intro
Pen Testing is BROKEN
I WANT A RED TEAM
ASSUMED WHAT?
Compromised USER
AV/EDR - DISABLED?
MALICIOUS USER
REAL WORLD TACTICS
ASSUMED BREACH TACTICS
DOMAIN FRONTING
INITIAL ACCESS
FINDING ACCOUNTS
KERBEROASTING
MINING AD
HUNTING GPP CREDS
LATERAL MOVEMENT
TRAWLING FILES/SHARES
HUNTING SESSIONS
BYO POWERSHELL
PROS & CONS
SUMMARY
QUESTIONS?

Reviews

Start your review of Assumed Breach - A Better Model for Penetration Testing

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.