+91-9999508202 [email protected]

Red Team Assessments Training

Beginner • Advanced

red team assessments training


The Red Team Assessments training provides security professionals with the knowledge and skills to perform penetration testing and defend on-premises Active Directory environments. With Active Directory being a critical component of most enterprise networks, security engineers need to be well-versed in the threats and attacks that can target this infrastructure. The course is based on extensive research and focuses on breaking Windows and AD environments.

There is often a significant gap in knowledge when it comes to AD security, and many security professionals and administrators struggle to fill it. Poor implementations and complex policies can lead to misconfigured environments, leaving them vulnerable to attacks. Over the years, the training has been refined through numerous real-world scenarios and delivered to internal engineering teams.

The Red Team Assessments training simulates real-world attack and defense scenarios. The training starts with Compromising a non-admin user account in the domain and progressing to enterprise admin. The focus is on exploiting various overlooked domain features, not just software vulnerabilities. Topics covered include AD enumeration, both automated and manual attacks, domain privilege escalation, domain persistence, Kerberos-based attacks (Golden ticket, silver ticket, and more), ACL issues, SQL server trusts, and bypassing defenses with malware development and C2 servers.

What You’ll Learn

  • Active Directory Implementation and Technical Foundations
  • Initial Access Methodologies and Practical Hacking
  • System Privilege Escalation with C2 
  • In-Memory Executions 
  • Attacking active Directory environments

Training Modules

Active Directory Pentesting Foundations
  • Active Directory Implementation Overview
  • Kerberos and NTLM authentication procedure
  • Domain ACL and Sensitive groups overview
  • Understanding Domain Trusts and boundaries
  • Designing Active Directory Pentesting Lab for Pentesting
  • MITRE AT & CT Framework for Pentesters
  • Understanding the C & C for active directory pentesting
  • Comparison matrix of C2 servers
  • Cobalt strike and Sliver-c2 framework
  • Designing domain fronting and redirectors
  • Designing C2 profiles to avoid detections
Initial Access Methodologies and Exploitation
  • Enumerating the organisation for initial access overview
  • Common public services insecurities
  • OSINT Primer for AD Pentesting
  • Windows API Overview
  • Process, threads, DLLs, Virtual memory
  • Creating payloads with windows API
  • Understanding the detection engineering and endpoint detections
  • Static and Dynamic analysis to bypass AV
  • Understanding the EDR and detections
  • Offensive VBA for pentesters
  • Developing malicious Doc for initial access
  • Stomping the malicious Documents
  • Crafting malware with JScript
  • Designing a spear phishing campaign for red team engagements
Privilege Escalation and Finding Common Issues
  • Automated enumeration of vulnerabilities
  • Windows privilege escalation attacks
      • Services exploitation
      • Credential theft
      • Bypassing LSASS protections
      • UAC bypassing
      • Token impersonation
    • Password Spraying attacks
    • Pass the hash attacks
    • RDP access with Pass the hash
    • Accessing LAPS
    • Misconfigured Sysvol policies
    • Brute forcing hashes
In-Memory Executions and PowerShell Primer
  • Basics of PowerShell cmdlets
  • File transfer with PowerShell
  • WMI and Powershell remoting
  • PowerShell Reverse shell and payloads
  • Payload execution on the fly 
  • Fileless attacks process and lifecycle
  • Reflective DLL loader with PowerShell
  • Obfuscation with PowerShell
  • Disabling defences and adding exclusions with PowerShell
  • Bypassing Restricted Admin mode
  • Understanding the AMSI service
  • Bypassing AMSI protections
  • Understating In-memory executions
  • Executing executable assemblies in memory
  • Enumerating users ,computer and groups
  • GPO , OU and ACL enumerations
  • Automating Domain enumeration with the bloodhound
Active Directory Attacks
  • Understanding the Application whitelisting 
  • Bypassing the Powershell execution restrictions
  • Restricting executions with Applocker policies 
  • Default policies and Custom policies 
  • Bypassing the app locker policies with common whitelisted locations
  • Bypassing CLM with the living off the lands techniques
  • Understanding Delegations
  • Attacking Unconstraint delegations
  • Attacking Constraint delegations
  • Attacking Service Principal Names
  • Attacking service accounts
  • Targeted Kerberosting attacks
  • Kerberos double Hope Issues
  • Attacking certificate services
  • Persistence via certificate services
Advanced Active Directory Attacks
  • Distributed COM Model issues
  • Pass the ticket and overpass the hash attacks
  • Domain certificate service attacks
  • NTLM Relay Attacks
  • Attacking via sensitive groups to become domain administrator
  • Exploiting ACLs in AD
  • Understanding domain persistence
  • Dcsync attack
  • DSRM and DCshadow attacks
  • ADCS attacks
  • Silver ticket attack
  • Golden ticket attack
  • Zerologon attack
  • Defensive primer for security engineers
  • The Principle of (Endpoint) Least Privilege and Just Enough Administration
  • Principal of Documenting and monitoring the data.
Who Can Apply For The Red Team Assessments Training ?
  • Individuals possessing a bachelor’s degree and a desire to cultivate advanced proficiencies in Cyber Security Assessments.
  • Professionals aspiring to advance their careers within the domain of Pentesting Infrastructure.
  • Individuals with a bachelor’s degree in an IT-related discipline who are inclined to shift towards the realm of Cyber Security.
  • Product Managers seeking to enhance their expertise in the field of Cyber Security through upskilling.
  • Security practitioners aim to enhance their expertise in offensive security tactics.
Training Delivery Details

Self-Paced Training

Self-paced, the ultimate in flexible cybersecurity learning! With unlimited access to your training, you can learn at your own pace, wherever and whenever it’s convenient for you. Our program includes all labs, exercises, and live support from Codefensive subject matter experts to ensure your success. Join us now to take control of your cybersecurity education!

On-Demand Live Training

Join virtual Codefensive training experience, right from the comfort of your own home! Our industry-leading instructors will deliver interactive courses via live stream, giving you the ultimate in cybersecurity education. Following each class, you’ll have the opportunity to enjoy a keynote from top industry professionals. Choose the ultimate in cybersecurity education and join us today!

Basics of Computer Networks
Basics of Cyber Security

Ready to Get Started?

Book an free consultation and Join the right training for you .