About The Training
Berlin 2025 | Trainings
- A Hands‑On Guide to Hardening Kubernetes & Cloud‑Native Infrastructure
- AI Security: Terminating The Terminator
- Advanced Infrastructure Security Assessment
- AdversaryOps: Engineering Red Team Tradecraft
- Application Security Tool Stack - How to Discover Vulnerabilities in Software
- Building Secure Firmware: Best Practices and Labs
- Cloud Red Team Tactics for Attacking and Defending Azure
- Cyber Threat Intelligence Bootcamp: Hands-on Labs & Real-World Scenarios
- EDR Evasion and Advanced Phishing Bootcamp
- Hacking Android Applications
- Hacking Modern Web & Desktop apps: Master the Future of Attack Vectors
- IoT Security Bootcamp GOA Edition
- Slaying the RE Dragon: Mastering Reverse Engineering
< Training Title />
Advanced Infrastructure Security Assessment
< Training Schedule />
Start Date: Mar 02, 2026
End Date: Mar 04, 2026
< Training Objectives />
Security systems are evolving and becoming more complex, and so are the hacking techniques. Every successful compromise of the network infrastructure has to evade multiple layers of security in a perfect sequence. Imagine yourself in an environment with diverse operating systems, servers, and applications with a legacy as well as in-house developed products and security solutions such as firewall, AV, etc. How do you plan to go ahead and pwn them all?
Learn to exploit and compromise targets where Metasploit will not work by default. Look inside exploit code, and tweak them to make it work against your targets. Perform a wide array of tricks to discover, enumerate and pwn services, systems, and domain controllers. Move around in an enterprise network with Active Directory. Analyze and exploit enterprise software components. Attack AI-based systems and leverage AI to your advantage in pentesting.
NOTE: This is an advanced training program. The participants are expected to be familiar with network services vulnerability assessment and penetration testing, including basic ideas about vulnerabilities and their exploitation techniques.
< Training Level />
Advanced
< Training Outlines />
Day-1&2
- Welcome & Knowledge sync
- Introduction & Lab setup
- Important keywords, methodologies & tools
- Leveraging AI for pentesting
- Exploiting hardened Web Apps
- Discovering endpoints
- WAF bypasses
- Advanced web hacking
- Manual exploit development & vulnerability chaining
- Evading network isolation
- Discovering backend systems
- Overcoming reverse shell/exfill obstacles
- Breaking security boundaries and gaining persistence
- Crossing isolation boundaries
- Obtaining higher privileges
- Gaining persistence
Day-2&3
- Active Directory
- Overview of AD
- Domain Controllers, FSMO roles, replication, service accounts, delegation, managed service accounts, etc.
- AD Reconnaissance
- LDAP queries, enumeration of users/groups, service accounts, ACLs, delegation rights, etc.
- Credential Extraction
- SAM, NTDS.dit, LSA Secrets, DPAPI, LSASS, in-memory, cached, process hooking, Credential Guard, etc.
- Lateral Movement
- Pass-the-Hash, Pass-the-Ticket, Kerberoasting, NTLM / SMB relay, DCSync, Golden Ticket, Silver Ticket, etc.
- Detection
- Logging, monitoring account changes, ACL modifications, service account password changes, etc.
- Hybrid
- Entra Reconnaissance
- Access Token Theft
- Sync
< WHAT TO BRING? />
- A laptop with administrator privileges
- Minimum 50 GB of free hard disk space
- Minimum 8 GB RAM for virtual machines
- A laptop should have Wi-Fi capability
- Ability to connect USB Drives for transfer of VMs
- VM Player or VMWare Workstation or Oracle VirtualBox installed
- Administrative rights on the laptop to disable AV
- ARM/Apple Silicon (M) will be supported with x86/amd64 emulation which might be a bit slow
< Training PREREQUISITE />
- Basic knowledge of TCP / IP network protocol
- Familiarity with virtualization tools like VMware / VirtualBox
- Experience with vulnerability assessment and penetration testing tools such as nmap, metasploit, Burp (or similar), netexec
- Familiarity with Web Application and basic Active Directory Security
- GitHub ID
< WHO SHOULD ATTEND? />
- IT-Security practitioners (Penetration Tester, Security Analyst, Security Engineer)
- (Junior & Senior) Red-Teamers
< WHAT TO EXPECT? />
- 3 intensive days of infrastructure penetration testing tools and techniques
- Practical exercises to strengthen your skills and deepen your knowledge
- Exploiting known and unknown vulnerabilities
- Developing custom exploits
- Real-world scenarios
< WHAT ATTENDEES WILL GET? />
- Slide-deck as cheat-sheet
- Access to repository with tasks and solutions
< WHAT NOT TO EXPECT? />
- This is not a beginner's course.
- Some labs used during the course will not be provided/accessible after the training.
< About the Trainer />
Prashant Mahajan runs Payatu Australia Pty Ltd and OzHack and works as a Teacher at TAFENSW. He has over a decade of experience in various aspects of Information Security, including penetration testing, vulnerability analysis, digital forensics, and incident response. He is also a developer of open-source tools such as ADRecon and AzureADRecon.
He is a founder member of Null - The Open Security Community and frequently speaks at industry events and trainings.
Sebastian Neef (aka @gehaxelt) is pursuing his PhD at the Technical
University of Berlin, where he conducts research and teaches on web and
network security. He discovered hacking as a hobby in his early teens
and has since turned it into his profession.
For nearly 15 years, Sebastian has worked as an IT security freelancer,
helping companies such as Google, PayPal, and many others strengthen
their systems through penetration testing and bug bounty programs. His
expertise has earned him top rankings on several platforms, including
Bugcrowd and Detectify.
He has been an active contributor to Nullcon for over three years —
organizing and writing challenges for the HackIM CTF, and speaking at
Nullcon and other conferences on topics such as large-scale network and
web vulnerability analysis.

