SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsWith the proliferation of multi-factor authentication, penetration testers need to apply existing tooling to manipulate even internal applications. Building attack infrastructure internally during a penetration test is resource exhausting, but modern tools like evilginx can do most of the heavy lifting for us.
This webcast will cover an excerpt from SANS SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking™, using evilginx to bypass internal application authentication.
There are many examples of public MFA bypass attacks, such as manipulating credentials from office365. Here, we will discuss and demonstrate such an attack, resulting in pivoting internally into an administrative console.
This webcast supports content and knowledge from SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking™. To learn more about this course, explore upcoming sessions, and access your FREE preview, click here.
James Shewmaker, founder of Bluenotch Corporation, has over two decades of technical experience in IT, primarily developing appliances for automation and security for broadcast radio, internet, and satellite devices.
Read more about James Shewmaker