The C|PENT Range
which is where our Penetration Testers gain
real-world skills, is designed to provide challenges across every level of the attack spectrum. Additionally, the range contains multiple layers of network segmentation, and once
access is gained in one segment, the latest pivoting techniques are required to reach the next segment. Many of
the challenges will require outsidethe-box thinking and customization of scripts and exploits to get into the
innermost segments of the network
With C|PENT, Learn Next-Generation Techniques and Methodologies for Handling Real-World Threat Situations
ADVANCED WINDOWS ATTACKS
This zone contains a complete forest that you first have to gain access to and once
you do, your challenge is to use PowerShell and any other means to execute Silver
and Gold Ticket and Kerberoasting. The machines will be configured with defenses
in place; therefore, you will have to use PowerShell bypass techniques and other
advanced methods to score points within the zone.
ATTACKING IOT SYSTEMS
With the popularity of IOT devices, this is the first Program that requires you to locate
the IOT device(s) then gain access to the network. Once on the network, you must
identify the firmware of the IOT device, extract it and then reverse
engineer it.
WRITING EXPLOITS: ADVANCED BINARIES EXPLOITATION
The challenges faced by Penetration Testers today require them to use their own skills
to find a flaw in the code. In this zone you will be required to find the flawed binaries,
reverse engineer them once found, and then write exploits to take control of the program
execution.
The task is complicated and requires Penetration from the perimeter to gain access
then discover the binaries. Once successful, you must reverse engineer the code.
Unlike other certifications, this will not just be a simple 32-bit code. There will be
32- and 64-bit code challenges, and some of the code will be compiled with the basic
protections of non-executable stacks.
Furthermore, you must be able to write a driver program to exploit these binaries, then
discover a method to escalate privileges. This will require advanced skills in binary
exploitation that include the latest debugging concepts and egg hunting techniques.
You are required to craft input code first to take control of program execution and
second to map an area in memory to get your shellcode to work and bypass system
protections.
BYPASSING A FILTERED NETWORK
The C|PENT Certification differs from the others. It provides web zone challenges
that exist within a segmentation architecture. As a result, you have to identify the
filtering of the architecture, leverage it to gain access to the web applications that
you will have to compromise, and then extract the required data to achieve
points.
PENTESTING OPERATIONAL TECHNOLOGY (OT)
As a first in a Penetration Testing Certification, the C|PENT contains a zone
dedicated to ICS SCADA networks. The candidate will have to penetrate them from
the IT network side, gain access to the OT network, and once there, identify the
Programmable Logic Controller (PLC) and then modify the data to impact the OT
network. The candidate must be able to intercept the Mod Bus Communication
protocol and communication between the PLC and other nodes.
ACCESS HIDDEN NETWORKS WITH PIVOTING
Based on studies and research, few professionals have been able to identify the
rules in place when they encounter a layered network. Therefore, in this zone, you will
have to identify the filtering rules then penetrate the direct network, and from there,
attempt pivots into the hidden network using single pivoting methods, but through
a filter. Most certifications do not have a true pivot across disparate networks and
a few, if any, have the requirement into and out of a filtering device.
DOUBLE PIVOTING
Once you have braved and mastered the challenges of the pivot, the next challenge
is the double pivot. This is not something that you can use a tool for. In most cases,
the pivot has to be set up manually. C|PENT is the first certification in the world that
requires you to access hidden networks using double pivoting
PRIVILEGE ESCALATION
The latest methods of privilege escalation are covered as well as there will be
challenges that require you to reverse engineer code and take control of execution,
then break out of the limited shell and gain root/admin.
EVADING DEFENSE MECHANISMS
The different methods of evasion are covered so that you can try and get your
exploits past the defenses by weaponizing them.
ATTACK AUTOMATION WITH SCRIPTS
Prepare for advanced Penetration Testing techniques/scripting with seven self-study appendices – Penetration Testing with Ruby, Python, PowerShell, Perl, BASH,
and learn about Fuzzing and Metasploit.
BUILD YOUR ARMORY: WEAPONIZE YOUR EXPLOITS
Carry your own tools and build your armory with your coding expertise and hack the
challenges presented to you as you would in real life.
WRITE PROFESSIONAL REPORTS
Experience how a Penetration Tester can mitigate risks and validate the report
presented to the client that makes an impact. The best part of it all, is that during
this rigorous process, you would be carrying your own tools, building your armory
with your coding expertise and hacking the challenges presented to you as you
would in real life.
Training Details
Training will be held at the IDEL site or a remote site.
Dedicated arrangement for a group of trainees.
40 Hours 5 days
Trainer Nabil Khalil, He holds a master’s degree in computer information systems from the University of Toronto, Canada, and holds an international license certificate in examining networks and systems, in addition to an MSS certificate from EC University New York and from many international institutions in information security and systems. He contributed to the development of international policies for information security and protection, the strategy for responding to information technology security incidents, the strategy for business continuity in many government and private sectors, the legal requirements related to information security, and the development of the training material for the information security awareness project in the financial sector. He also trained information security officers in The public and private sectors, and auditing by adopting best practices within, ITIL, ISO, CMM, COBIT, and he is a member of ISACA, and one of the international authors in information security affiliated with the international organization EC-Council and a certified trainer from EC-Council and Microsoft Corporation, in addition to a trainer Certified Instructor ITIL, IOS 27001, and 24 years of practical experience
Adhere to the EC-COUNCIL Policy
Compliance with the Information Systems Standards
IS/IT auditors/consultants
IT Compliance Managers
Chief Compliance Officers
Chief Risk & Privacy Officers
Security heads/directors
Security managers/architects
LPT RESOURCE
Accreditation, Recognitions & Endorsements





