Introduction:

With growing usage of desktop applications in various segments like aviation, healthcare, public infrastructure, logistics, finance, education, hospitality and many more in the form of kiosk / un-attended systems in public, it opens scope of information & network security. Also with change in way of work getting flexible from home due to Covid-19, this increases the responsibilities of enterprises to have their systems run safely using multiple endpoint protection tools like DLP/EDR/KIOSK/PAM etc..

This training course would target such areas where systems are secured via hardening using Windows/3rd party tools and how we can evade hardening to gain unrestricted system access. After having system access trying to elevate privilege within the Windows system.

Learning these techniques would help in pentest, designing tools securely which can be used in commercial products or enterprise systems.

Table of Content

  1. Day 1
    • Setting up OS Hardening with custom scripts, which would demonstrate what changes are made so that participants can visualize their scope.
    • Learning core concepts like Reg/filesystem permissions, user roles & privileges, process inheritance, cross ownership, etc.& getting familiar with commands which would be used during the entire session.
    • Win11 KIOSK Bypass techniques to access restricted windows components like creds. manager, certificate store, registry, filesystem, etc.
    • Group policies and Registry restriction bypass
    • Various techniques to access command prompt / powershell when blocked via sys. Admin in Win11
    • Win11 UWF (unified write filter) bypass techniques
    • Accessing restricted Control Panel components in Win11
    • Working with deploying multiple 3rd party KIOSK/Hardening end point protection apps. And exploiting multiple vulnerabilities which undergone CVD.
    • Creating Shell Explorer by self and designing KIOSK to understand nature of Winlogon while hardening.
    • bcdedit, insecure boot to evade DLP/EP software/KIOSK
    • Few techniques via which DLP can be bypassed being non-admin standard user or admin user, leaving no traces.
    • Gaining Command execution via compiling binaries, using other platform binaries, extension precedence rule, shortcuts, task scheduler, ActiveXObject, etc..
    • Creating reverse shell executables and managing remote connections for persistence.
  2. Day 2
    • Applocker restriction rules and various bypass techniques
    • Understanding design restrictions for Administrator vs System, followed by leveraging multiple techniques to gain system privilege and get execution of restricted components.
    • Writing rules to Allow list of apps via directory – path – signature. And bypassing all those 3 techniques.
    • Using ReactOS to evade signature based app restriction
    • Understanding UAC & identifying various bypass techniques
    • Understanding Windows controlled folder access and it’s misconfigurations
    • Various techniques to uninstall security providing EPM application (e.g. antivirus, DLP, remote administration, etc.) in restricted environment
    • Gaining access to admin via exploiting various EPM apps
    • Post bypassing OS Hardening various techniques of Privilege escalation like extension precedence, misconfigured service parameters, token priv., dll preloading, unquoted service path, cmdkey, tasks, Reg hive dump, always elevated, startup, etc.
    • CTF to practice & summarize all items learnt

Student Requirement:

  • Basic Knowledge of how Windows OS & Virtual Machines works
  • Although there would be few small scripts used during the session, but it's completely fine if you do not have scripting/programming knowledge.
  • Windows 11 Enterprise 64bit Evaluation VirtualBox VM (If you do not have license make use of use https://www.microsoft.com/en-in/evalcenter/evaluate-windows-11-enterprise)

Who should take this training:

Pentesters, Security architects or developers who want to have security by design in their products, Windows administrators, security professionals from IT security.

Who would not be a good fit for this training:

People focusing on any other OS apart from Windows, People Looking for Network Assessments/core Anti-virus evasion/Fuzzing/Kernel exploitation.

Audience level:

Beginners

Duration

2 days