Hands-on Hacking Advanced (HOHA)
Hands-on Hacking Advanced (HOHA) is a follow-up course to Hands-on Hacking Essentials (HOHE) training.
The main differences between hacking and penetration testing are the intent and (imposed) limitations. Therefore, the idea behind this training is to see practical information security from the attacker’s or “opposing team’s” point of view and to deliver first-hand experience or running attacks.
Everyone will walk through the phases of an attack until successfully 0wning various systems and services. There are plenty of attack scenarios to play through and to complete scored objectives. Since the expected participants’ skill and experience level is varying to a large degree, a mix of *nix and Windows world is covered and focus is on explaining key concepts and on showing real attacks even to those who have never compiled or launched any exploits before.
During the 3 days hands-on training experience the participants should build upon HOHE training in understanding of current attacker tool-sets, attack types and methods. By experiencing the attacker mindset and point of view via hands-on exercises the participants will use Cobalt Strike and other tools from Red Teaming perspective in order to understand what it takes in terms of individual skills to be a red team member.
Target audience: System administrators, information security specialists and -managers and any other IT personnel that is not afraid of the shell or command prompt.
Pre-requisites: Prior HOHE participation is required to take this course to ensure minimum same level of participants
Intended outcome: During the 3 day hands-on training experience the participants should form a good understanding of current attacker tool-set, attack types and methods. By experiencing the attacker mindset and point of view via hands-on exercises the participants not only will gain much higher appreciation for attack threats, but will be much more alert and better prepared for their own IT systems defense.
More information: read from here.