Building and Breaking:

Infrastructure

The AkimboCore team regularly run hands-on security and penetration testing courses across the UK. With labs to allow you to get practical experience breaking security systems, before teaching you how to build the systems in a more resilient way.

Learn how to compromise and secure network infrastructure. From zero access to Domain Administrator:

Want to know what we cover? Here's the detail:

Want to book a place?

Whether you're looking for a spot just for you, or a course delivered for your whole team, you can get in touch below!

Infrastructure Security Training Content

Our infrastructure security course covers a lot, here's a list of some of the things we cover:

Infrastructure Attacks

Attacks to compromise user accounts and establish shell access to systems.

Kerberos Attacks

We demonstrate common kerberos attacks including party tricks, kerberoasting, overpassing the hash, passing the key, and more. This includes hands-on labs for each major issue.

Interception Attacks

Interception attacks include abusing link-local multicast name resolution, as well as attacks such as ARP spoofing to allow credential theft, malicious proxy attacks, and SMB relay attacks.

Compromising Accounts

Bruteforcing is a noisey, but often effective method of gaining an initial foothold into a network – so we cover how to perform it without being detected and without locking accounts out.

Exploitation Frameworks

Many of the attacks discussed can be automated through attack frameworks, so we include hands-on labs with tools such as Metasploit and Crack Map Exec.

Privilege Escalation

Methods to escalate privileges from domain user to local administrator, and from local administrator to domain administrator.

Token Impersonation

If you successfully compromise a system where an administrator is currently logged in, it’s trivial to extract the administrative tokens from memory and impersonate that user. Our hands-on labs allow you to try it yourself.

Password Extraction

Some systems hold plain text credentials in memory, or can be easily reconfigured to, and these can be extracted to allow for privilege escalation attacks.

Abusing Caches

It’s very common for devices to cache credentials locally; if you can exploit the system to get command execution you may be able to extract other user credentials from caches.

Our infrastructure labs include a range of vulnerable systems, allowing hands-on learning.

Network Mapping

Mapping the target environment is a critical part of any infrastructure assessment, so we demonstrate host discovery, port scanning, and service discovery. As well as methods of mapping an environment which can avoid detection.

Persistence

We discuss methods of performing attacks without being detected, including living off the land techniques as well as anti-virus evasion. We investigate persistence techniques such as domain credential extraction as well as golden ticket attacks.

Remediation

Once all the hacking fun has been done, we revisit each attack to see how systems can be hardened to prevent real-world attackers from compromising your systems.

Want to share this information with someone?