Tried, Tested and Proven



Description of the Course

This course is designed to offer further training for performing an infrastructure penetration test, and builds on the knowledge gained within the beginner course.

The course will cover further steps and more advanced techniques of infrastructure penetration testing, from local privilege escalation to further remote exploitation.

The course will also provide further reading material which can be used as preparation for further courses such as the “advanced penetration testing” course.

This is a two day course.

Delegate Requirements

Minimum Skills Needed

To join this course, the participant is expected to have the following knowledge / skills / experience:

All skills required for “infrastructure penetration testing – beginner”;

A working knowledge of basic infrastructure testing tools, including network mapping tools and vulnerability scanners;

Experience with both Windows and Linux operating systems;

Previous infrastructure penetration testing experience.

 Knowledge of programming is not a requirement, but may be advantageous. If there is concern over a potential candidate’s suitability, we can arrange a discussion with the course leader to assess this.


As part of the course delivery, participants will need to access a purpose built test environment, in which techniques can be practiced. Therefore, participants will require:

Laptop with local administrator access and permission to load 3rd party software onto it. Hire laptops available on request for an additional fee.

A bootable image will be provided as part of the course materials and can be used as the operating system for the duration of the course. Candidates may also use their own preferred build.


What will be covered in the course (overview):

Further methodologies used by an infrastructure penetration tester, building on techniques used within the “infrastructure penetration testing – beginner” course;
Leveraging of access to exploited systems and further exploitation, both within the target network and local to the system;
Commonly found network-level misconfigurations and exploitable services.

What will be covered in the course (specifics):

Terminal service breakout;
Privilege escalation on Windows;
Privilege escalation on *nix;
Exploiting local vulnerabilities (local exploits);
Exploiting DBMS listening on the network;
Leveraging Windows domains & trusts – incognito;
Leveraging unprotected X servers – controlling and keylogging;
VPN testing;
VLAN trunking;
Exploiting unknown services;
Multi-staged exploitation – web application to code execution to privilege escalation;
Known Solaris vulnerabilities:sAdminD
TTY Prompt
Telnet –fbin





Cost (per participant)

Infrastructure penetration testing Intermediate 2 £1,200