Have you ever wondered how nation-state actors gain access to target networks? Do you recall ShadowBrokers leak containing logs from a successful compromise of one of the Swift network providers in the Middle East? Or many other cases of telecoms’ compromises?
A lot of training courses available today provide only few basic tips and techniques on how to perform simple network attacks (ie. ARP spoofing). This means you as a penetration tester or a red teamer miss a lot of vulnerable space to exploit and control. Imagine yourself gaining administrative access to every router and switch on the network, taking control over any traffic stream flowing through the organization. You could potentially sniff, blackhole, redirect or even modify the bits and bytes of your interest. This is a very powerful stance only few are able to achieve.
We, as former network engineers, have combined decades of experience in managing various network infrastructures. We’ve noticed that there’s a lack of advanced network offensive course and we want to fill this gap. The training is especially aimed at red teamers, pentesters, network administrators. It’s advanced, in-depth, hands on and it is not suitable for beginners, unless you have strong understanding of networking concepts.