ROOTCON 17 - Trainings

Active Directory Pentesting
Active Directory (AD) is the driving force behind enterprises, as it is utilized by more than 90% of Fortune 1000 companies. Despite its ubiquity, many security professionals and administrators face challenges in addressing AD security due to a substantial knowledge gap.

This course aims to assist security professionals in comprehending, examining, and practicing threat mitigation and attack strategies in a contemporary Active Directory environment.

We discuss various topics, including AD enumeration, the tools that can be used for it, domain privilege escalation, domain persistence, Kerberos-based attacks such as Golden ticket and Silver ticket, ACL issues, SQL server trusts, etc. The course offers valuable insights for individuals at all levels, whether they are beginners, red team members, penetration testers, or blue team members.

Student Requirements
- Basic knowledge of PowerShell
- Familiarity with the Windows operating system
- Basic understanding of Active Directory.
- Ability to use command line tools.

Target Audience
Red teamer or blue teamer, Penetration tester & Security Professionals.

Trainer Bio
Ashish Bhangale
Senior Security Researcher at INE. Prior to joining INE, He was working as a senior security researcher at Pentester Academy (Acquired by INE). He has 10+ years of experience in Network and Web Application Security. He has also worked with the state law enforcement agencies in the capacity of a Digital Forensics Investigator and was instrumental in solving IT fraud/crime cases. He has presented/published his work at Blackhat, DEFCON USA/China, Wireless Village and IoT village. He has contributed to many innovative research projects like Chigula (WiFi Forensics Framework) and Chellam (First pure WiFi Firewall) frameworks, and created multiple projects like Vulnerable Web Application OSes, Vulnerable Router Project and Damn Vulnerable Wordpress. His areas of interest include Advanced Pentesting, Forensics, WiFi and AD security.

Attacking Serverless Applications
With the advent of serverless computing, the developers no longer have to worry about servers. The infrastructure management tasks like capacity provisioning, patching, etc. are handled by the cloud service provider allowing developers to focus only on writing the code.

Serverless architecture is said to be more secure compared to traditional architecture. However, this does not mean that attacks cannot be performed on it. This training is designed to provide cybersecurity/cloud professionals with an understanding of how serverless computing works and the various security risks that can arise in serverless environments.

Participants in the training will learn about the different components of serverless architectures, such as APIs, event triggers, and serverless functions, and how these components can be attacked. This training is focused on attack vectors on the AWS serverless application stack.

The class will be conducted on our cloud-based, state-of-the-art lab platform where attendees will be doing lab exercises in class! Over 90% of class time will be spent on these hands-on labs! Unlike most cloud trainings, the attendees will not have to set up any resources on their personal accounts.

Student Requirements
- Basic knowledge of computers and networking
- Familiarity with the Linux operating system
- An AWS Account (Free Tier Eligible account will suffice)

Target Audience
Pentesters, Developers, Cloud Administrators, AWS Security Enthusiasts and Researchers.

Trainer Bio
Shantanu Kale
Infrastructure Lead, Lab Platform at INE with strong roots in Cloud, Linux, and Web Application Security. He has published his work in BlackHat USA/ASIA, Defcon DemoLabs and has been a co-trainer in Cloud Security and Network Penetration testing training. He has led teams for various national-level hackathons, including the Smart India Hackathon conducted by GoI. His areas of interest include Advanced Pentesting, Cloud Security, Malware Analysis, Cryptography, Web Application Security, and AD Security.