Offensive Infrastructure Exploitation - Live - 2 Days Class in SanFrancisco


Offensive Infrastructure Exploitation - Live - 2 Days Class in SanFrancisco



Offensive Infrastructure Exploitation is an action-packed, hands-on class giving attendees a chance to perform real-world exploitation on corporate infrastructure scenarios.  

The training is intended for both absolute beginners and pentesters alike, and starts with the basics of networking, gradually moving to topics such as scanning, enumeration, exploitation and post exploitation, all of which is accompanied with practical lab exercises in a CTF style format

Offensive Infrastructure Exploitation is a result of years of pentesting experience, compromising some of the highly secure targets combined into one practical and hands-on class.

Since the course is extremely practical, expect to pop a lot of shells during the attack. The training class has a number of targets and you’ll be exploiting both Windows and Linux platforms. 

The training class also involves topics including Exploiting private networks, Writing own python exploits, Shellcoding for customizing exploits, attacking Databases and more. The class also gives attendees a hands-on experience with “popular” vulnerabilities such as Shellshock, Heartbleed, POODLE and more. 

Offensive Infrastructure Exploitation has been taken by 1000+ security professionals and red team members worldwide to begin and advance their pentesting and exploitation skills. 

This course is for you if you want to pentest and exploit infrastructure using cutting edge techniques. The training includes 50+ labs and 30+ challenges which are inspired by real world vulnerabilities and case studies.


After the class, the attendees will be able to: 

  • Perform Information Gathering, Network Scanning and Enumeration 
  • Write own Python scripts for pentesting and web info gathering 
  • Shellcoding and customizing existing shellcodes
  • Learn to use Metasploit for real-world exploitation
  • Pentest Linux based systems 
  • Exploit vulnerable binaries, service misconfigurations, weak file permissions etc. 
  • Pentesting Windows with UAC Bypass
  • Use Powershell for Post-Exploitation 
  • Pentesting Routers and SNMP interfaces 
  • Buffer Overflows, MITM, Server Side attacks and Client based exploitation
  • Using Port forward and tunnelling in real-world pentests
  • Web app attacks including XSS, Injections, RCE, File uploads and more. 
  • Attacking CMS - Wordpress, Drupal and Joomla 
  • Database Hacking - MySQL, SQL Server, MongoDB, Postgres and Oracle 
  • Additional real-world exploitation (SSL 2.0, Poodle, JWT, Heartbleed and more) 
  • Write Python scripts/tools and modify public available exploit code as per requirement in pentest process 
  • Perform Antivirus evasion, UAC bypassing and firewall bypassing using tunnelling techniques
    And more. 

All the above-mentioned topics are taught with extremely hands-on lab-based practical sessions. 


  • VMs for Pentesting
  • Vulnerable labs prepared exclusively for the training 
  • Printed Lab reference material and handouts
  • 400+ slides (PDF Copy)


  • Anyone willing to learn real-world pentesting techniques and Infrastructure exploitation methods
  • Pentesters who want to take their skills to the next level 
  • Security Professionals interested in learning Infrastructure pentesting 


  • Duration: 2-days class 
  • Location: San Francisco, US (SoMA)
  • Dates: Oct 2017
Add To Cart