Professional Documents
Culture Documents
Course 276 Exercise 4
Course 276 Exercise 4
Documents provided to participants are strictly reserved for training purposes and are copyrighted by Parker
Solutions Group and Sysca Consulting. Unless otherwise specified, no part of this publication may be, without the
written permission of Parker Solutions Group and Sysca Consulting be reproduced or used in any way or format
or by any means whether it be electronic or mechanical including photocopy and microfilm.
172.16.0.51 - PECB-win7.sys.lab
172.16.0.52 - PECB-DC.sys.lab
syslab\john.smith - Qazwsx12+1
syslab\jack.russell - Qazwsx12+1
---
Exploit - Old and vulnerable version of TFTPDWin is installed on PECB-Win7. Metasploit has a stable exploit for
this granting Admin privileges
Priv esc - Unquoted service binary path. A dummy service has been installed that is running with SYSTEM
privileges and uses an unquoted service binary path.
https://github.com/gentilkiwi/mimikatz/releases/tag/2.0.0-alpha-20150419a
When working with lsass process, mimikatz needs some rights, choice:
Without rights to access lsass process, all commands will fail with an error like this: ERROR
kuhl_m_sekurlsa_acquireLSA ; Handle on memory (0x00000005) (except when working with a minidump).
So, do not hesitate to start with:
mimikatz # privilege::debug
Privilege '20' OK
We would be very grateful if you could provide us with your evaluation related to the following characteristics of
the training and instructors.
Also, if you have suggestions for improving PECB’s training materials, we'd like to hear from you. We read and
evaluate the input we get from our members. Please open a ticket directed to Training Department on PECB’s
website in the Contact Us section.
In case of dissatisfaction with the training (trainer, training room, equipment,...), the examination or the
certification processes, please open a ticket under “Make a complaint” category on PECB’s website in the
Contact Us section.
After participating in this training, participants will receive a certificate of 31 CPD (Continuing Professional
Development) credits via e-mail.
Infrasructure Specialist: An Infrastructure Specialist focuses on the testing of core elements of infrastructure
such as network devices, wireless, servers and cloud environments. This course gives the candidate a full
understanding of how to effectively test infrastructure using specialist techniques and tools building on the
principles from the Certified Lead Pen Test Professional course.
Web Application Specialist: More and more applications are now becoming web based and available online.
A web application penetration testing specialist will be equipped with all the skills to analyse a web application
and identify attack vectors and vulnerabilities. This course will focus on the techniques and skills need to
understand and exploit web applications and will include a deep dive of the guidance from the Open Web
Application Security Project (OWASP).
Mobile Specialist: As organisations utilize mobile technologies and applications more and more including smart
phones and tablets, this course focuses on how to test the security of such devices and the applications deployed
on them. The course will identify the tools and techniques used to test and exploit such devices.
Social Engineering Specialist: Being able to gain access to information, targets and credentials without
conducting technical hacking is a specialist skill in its own right. Often social engineering is used in most real
world cybercrimes, whether in person, via the telephone or via electronic means such as email or instant
messaging. This course will teach you the psychological elements, physical perimeter security and hardware
tools, techniques and skills used in social engineering and how these can be used in a penetration test to really
understand the vulnerabilities faced by an organisation.
The Certified Lead Forensics Examiner course allows a person to learn the basic skills employed by a
professional forensics examiner. The course covers the fundamentals of forensics, how to organise and lead a
forensics examination and how to apply these techniques in relation to a variety of technologies and
environments. The skills learned in this course are complimentary to the Certified Lead Penetration Tester as a
skilled tester usually has the skills and knowledge to conduct investigations relating to real security breaches.
The ISO 27005 training “Certified Risk Manager” allows a person to become proficient in the fundamental
elements related to the management of risks related to information: planning of a risk management programme,
analysis, evaluation, risk treatment, risk communication and surveillance. Through readings, class exercises
based on real cases, discussions and demonstrations with risk modeling tools, the participant will be able to
perform an optimal risk evaluation and to manage risks through time by knowing its lifecycle. Please note that
this training perfectly follows the framework of an ISO 27001 standard implementation process.