logo


your one source for IT & AV

Training Presentation Systems Services & Consulting Cloud Services Purchase Client Center Computer Museum
Arrow Course Schedule | Classroom Rentals | Student Information | Free Seminars | Client Feedback | Partners | Survey | Standby Discounts

PEN-300 - Advanced Evasion Techniques and Breaching Defenses (ETBD/OSEP)

SS Course: GK840105

Course Overview

TOP

Building on the skills acquired in PEN-200, OffSec s PEN-300 5-days course explores advanced penetration testing techniques against hardened targets. Learners gain hands-on experience bypassing security defenses and crafting custom exploits in real-world scenarios, enhancing their expertise in ethical hacking and vulnerability assessments.

This course culminates in a challenging exam, leading to the OffSec Experienced Penetration Tester (OSEP) certification. Achieving the OSEP certification distinguishes professionals with advanced penetration testing skills, making them highly sought-after experts in securing organizations from sophisticated threats.

                                                                  

Scheduled Classes

TOP
02/02/26 - GVT - Virtual Classroom - Virtual Instructor-Led
04/20/26 - GVT - Virtual Classroom - Virtual Instructor-Led

Outline

TOP

Evasion Techniques and Breaching Defenses: General Course Information

  • About the PEN-300 Course
  • Provided Material
  • Overall Strategies for Approaching the Course
  • About the PEN-300 VPN Labs
  • About the OSEP Exam

Operating System and Programming Theory

  • Programming Theory
  • Operating System and Programming Theory
  • Client-Side Code Execution with Office

Client-Side Code Execution with Office

  • Will You Be My Dropper
  • Phishing with Microsoft Office
  • Keeping Up Appearances
  • Executing Shellcode in Word Memory
  • PowerShell Shellcode Runner
  • Keep That PowerShell in Memory
  • Talking to the Proxy

Client-Side Code Execution with Windows Script Host

  • Creating a Basic Dropper in JScript
  • JScript and C#
  • In-memory PowerShell Revisited

Process Injection and Migration

  • Finding a Home for Our Shellcode
  • DLL Injection
  • Reflective DLL Injection
  • Process Hollowing

Introduction to Antivirus Evasion

  • Antivirus Software Overview
  • Simulating the Target Environment
  • Locating Signatures in Files
  • Bypassing Antivirus with Metasploit
  • Bypassing Antivirus with C#
  • Messing with Our Behavior
  • Office Please Bypass Antivirus
  • Hiding PowerShell Inside VBA

Advanced Antivirus Evasion

  • Intel Architecture and Windows 10
  • Antimalware Scan Interface
  • Bypassing AMSI With Reflection in PowerShell
  • Wrecking AMSI in PowerShell
  • UAC Bypass vs Microsoft Defender
  • Bypassing AMSI in JScript

Application Whitelisting

  • Application Whitelisting Theory and Setup
  • Basic Bypasses
  • Bypassing AppLocker with PowerShell
  • Bypassing AppLocker with C#
  • Bypassing AppLocker with JScript

Bypassing Network Filters

  • DNS Filters
  • Web Proxies
  • IDS and IPS Sensors
  • Full Packet Capture Devices
  • HTTPS Inspection
  • Domain Fronting
  • DNS Tunneling

Linux Post-Exploitation

  • User Configuration Files
  • Bypassing AV
  • Shared Libraries

Kiosk Breakouts

  • Kiosk Enumeration
  • Command Execution
  • Post-Exploitation
  • Privilege Escalation
  • Windows Kiosk Breakout Techniques

Windows Credentials

  • Local Windows Credentials
  • Access Tokens
  • 3 Kerberos and Domain Credentials
  • Processing Credentials Offline

Windows Lateral Movement

  • Remote Desktop Protocol
  • Fileless Lateral Movement

Linux Lateral Movement

  • Lateral Movement with SSH
  • DevOps
  • Kerberos on Linux

Microsoft SQL Attacks

  • MS SQL in Active Directory
  • MS SQL Escalation
  • Linked SQL Servers

Active Directory Exploitation

  • AD Object Security Permissions
  • Kerberos Delegation
  • Active Directory Forest Theory
  • Burning Down the Forest
  • Going Beyond the Forest
  • Compromising an Additional Forest

Combining the Pieces

  • Enumeration and Shell
  • Attacking Delegation
  • Owning the Domain

    Prerequisites

    TOP

    While there are no formal certification prerequisites, a strong understanding of operating systems, networking, and scripting (e.g., Python, Bash) is highly recommended. Additionally, familiarity with the concepts and techniques covered in PEN-200 (Penetration Testing with Kali Linux) is highly recommended for success in this course.

      Who Should Attend

      TOP

      The PEN-300 course is ideal for experienced penetration testers and security professionals seeking to master advanced penetration testing methodologies, ultimately earning the OSEP certification.