Hands-On Hacking Advanced (HOHA) (inglise keeles)
Training duration: 3 days of pure hacking and feeling “1337” (24 academic hours)
Group size: 10 participants maximum
Target audience: System administrators, information security specialists and -managers and any other IT personnel that is not afraid of the shell or command prompt
Pre-requisites: Prior HOHE participation is required to take this course to ensure minimum same level of skill-set.
The training is held by our partner Clarified Security.
Contents of the training
Hands-on Hacking Advanced (HOHA) is a follow-up to our Hands-on Hacking Essentials (HOHE) training. While HOHE is an eye-opening “shock therapy” training mostly for defenders, HOHA introduces more of the attacker and red teaming perspective. While the training still focuses mostly on the individual skills of participants, we will introduce red team team-working mode towards the end of the training with team servers and beacon servers.
While HOHE was intentionally built around totally freely available tools, HOHA is mostly built around Cobalt Strike (a commercial and red teaming oriented version of Armitage which we use in HOHE). Since Clarified Security team uses Cobalt Strike in red teaming for large-scale cyber exercises, mostly for client-side attacks, this training derives from these practical experiences and makes such training with red teaming twist available for wider audiences.
With HOHA course we build on our (pre-requisite) HOHE training and deliver 3 days of first-hand, pure hacking experience where a large „Network Takeover” scenario takes a center stage and teamworking mode sets in towards the end.
During the 3 day hands-on training experience the participants should build upon HOHE training in understanding of current attacker tool-sets, attack types and methods. By experiencing the attacker mindset and point of view via hands-on exercises the participants not only will use Cobalt Strike and other tools from a red team member perspective and should understand what it takes in terms of individual skills to be a read team member with a taste of team-working as well.
Technical requirements for the training
You will need to bring your own laptop. Everyone needs to bring their own laptop that has WiFi (or LAN cable port) for connecting to the training environment via our VPN device. Any OS is fine, all you need is a SSH and VNC client. For Windows users portable apps Putty.exe and vncviewer.exe will be available to download locally, thus, typical corporate Windows users do NOT need any admin privileges.
Computers need at least 1024×768 resolution, must be able to obtain IP address from our device’s DHCP server, users must be able to log in with local accounts as domain controller nor direct Internet connection will not be available.
You will be connecting to your attack platform (a Kali Linux VM), hosted within our our hacking lab environment, using SSH and VNC. If you don’t have clients for these protocols already, we can provide them to you when you arrive.
Täienduskoolituse õppekavarühm: Informatsiooni- ja kommunikatsioonitehnoloogia interdistsiplinaarne õppekavarühm
Karl RaikPentester (WebApps) and trainer
Karl joined Clarified Security team in September 2015 as a Web application pentester. His previous work experience consists mainly of Web Application development. He holds a M.Sc. degree in Cyber Security from Tallinn University of Technology. He wrote his masters thesis about improving Web Attack Campaign overview in Cyber Defense Exercises. Karl is a trainer of our Hands-on Hacking Essentials (HOHE) and Hands-on Hacking Advanced (HOHA) courses.