Contact

    (+91) 974-690-6654      |          Email :

Keynote / Chief Guest

Pinarayi Vijayan

Pinarayi Vijayan

Chief Minister

Kerala State

 

Rajeev Chandrasekhar

Rajeev Chandrasekhar

Union Minister of State for Electronics and Information Technology

Union Minister of State for Skill Development and Entrepreneurship.

Govt. of India

Admiral Radhakrishnan Hari Kumar

Admiral Radhakrishnan Hari Kumar

PVSM, AVSM, VSM, ADC

CHIEF OF NAVAL STAFF

Ministry of Defence, India

Windows Privilege Escalation and Bypassing Win10 OS Hardening


  • 21 -22 Sep, 2022
  • 2 days
  • Grand Hyatt, Kochi, India

 Trainers

Kartik Lalan Sr. Security Engineer , PIC (Independent) ,  

Aravind C Ajayan Sr. Security Engineer , PIC (Independent) ,  

Who should attend

Pentesters, Windows Developers/Architects who want to develop secure thick clients / Hardened OS systems, Anyone who wants to plan any Offensive security certifications.

Student Requirement
  • → Basic Knowledge of how any OS works and how thick client works
  • → Basic Knowledge on how to use VirtualBox
  • → Passion to Learn New Things
  • → Windows 10 Evaluation VirtualBox VM (90 days trial / License if they have)
  • → List of other tools would be shared to participants
OBJECTIVE

Training covers multiple technique involved into bypassing latest Windows10 OS hardening & various techniques of Windows Privilege escalation. The main essence of course being- it is designed while working over multiple real life products & vulnerabilities identified into those, touching all domains.



COURSE CONTENT (ToC)
DAY 1
  • → Starting with setting up platform by using several Windows10 components / service / settings which are responsible for hardening the OS. Getting familiar with commands which would be used during both days. Followed by exploring various techniques to bypass OS Hardening based on Windows 10 Kiosk mode, App locker, UWF (unified write filter), Task scheduler, Local/group policies, Regedit, writing scripts from restricted file explorer, RBAC, Piggybacking thick clients to exploit and execute restricted components, Partition restriction bypass, Executing restricted scripts, Creating TCP socket backdoor in presence of firewall, invoking restricted control panel, etc.
DAY 2
  • → Starting with previous days limited user shell to elevate it till admin. Using various techniques like Windows file search order, Insecure file permissions, insecure booting, Unquoted service path enumeration, Enumerating admin user credentials from SAM-SYSTEM file, manipulating path environment variable, Dll pre-loading, Web R.C.E. leading to privilege shell in absence of LPA, insecure service based privilege escalation, writing your own script in various languages supported by platform to gain privilege shell, NC & MSF based reverse shell with admin, etc. Ending with Frequently found thick client vulnerabilities like insecure file system, weak cryptography, Code signing, Intercepting HTTP/TCP transport layer packets via various techniques, obfuscation, memory information extraction, etc. & exploring new tools used in thick client.

AUDIENCE LEVEL
  • Beginners/Intermediate
STUDENT REQUIREMENT
  • Basic Knowledge of how any OS works and how thick client works
  • Basic Knowledge on how to use VirtualBox
  • Passion to Learn New Things
  • Windows 10 Evaluation VirtualBox VM (90 days trial / License if they have)
  • List of other tools would be shared to participants
DURATION:
  • 2 Days (8 + 8 hours.)
WHO SHOULD TAKE THIS TRAINING:
  • Pentesters, Windows Developers/Architects who want to develop secure thick clients / Hardened OS systems, Anyone who wants to plan any Offensive security certifications.
WHO WOULD NOT BE GOOD FIT FOR THIS TRAINING
  • People focusing on any other OS apart from Windows, People Looking for Network Assessments
Trainers
Kartik Lalan
Kartik Lalan
Sr. Security Engineer

PIC (Independent)

 

Security Engineer @ Security Centre of Excellence – Philips Innovation Campus. He is M.Tech.

in CS with Specialization in Information & Network Security. He conducts frequent talks and workshops on InfoSec topics @ several places including C0C0N, Bsides Delhi, OWASP, Null A'bad & Bangalore Chapter, DroidConIN. Kartik loves to write technical Blogs in his leisure time.


Aravind C Ajayan
Aravind C Ajayan
Sr. Security Engineer

PIC (Independent)

 

Aravind C Ajayan is a Sr. Security Engineer with Philips India and is part of the Security Centre of Excellence team. Aravind's primary areas of expertise are web/thick client application penetration testing, hardened system security, network security, and windows active directory security. He has helped to fix severe issues in IMS(Internet Management Software) solutions through responsible disclosures. Aravind pursued his master's in Cyber Security Systems and Networks from Amrita Vishwa Vidyapeetham, Coimbatore. He is an Offensive Security Certified Professional (OSCP) and has published several research papers on security in IEEE and Springer.