SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsAs cyberthreats grow more sophisticated, it is critical to proactively identify and address vulnerabilities before adversaries exploit them. SANS Offensive Operations delivers expert-led training across the entire attack surface, covering everything from penetration testing and red teaming to exploit development and hardware hacking. Through hands-on labs and industry-recognized certifications, we equip professionals to master real-world offensive techniques and adversarial tactics.
Use real-world tactics, tools and methodologies to identify, exploit, and remediate security vulnerabilities.
Learn adversary emulation, stealth, and evasion techniques to test and improve an organization's security posture against persistent threats.
Bridge the gap between offense and defense, to foster collaboration between red and blue teams and strengthen detection, response, and overall security resilience.
In one week, my instructor built a bridge from typical vulnerability scanning to the true art of penetration testing. Thank you, SANS, for making myself and my company much more capable in information security.
NVISO co-founder and SANS Senior Instructor, leading cybersecurity education in advanced adversary tactics. Experienced in offensive security with extensive background in penetration testing and ethical hacking across Europe.
Learn moreChristopher is a senior security analyst for Counter Hack and Operations Officer (S-3) for the Army National Guard's 91st Cyber Brigade. Through his work, he shares his unique insights into cyber security threats to prepare and inspire students.
Learn moreMoses has built an impressive career as a Network Architect, DevOps Engineer, and Information Security professional. Today, he works in the Offensive Operations space as a Red Team Operator and serves as the course author for SEC588.
Learn moreEuropean director of advanced assessment at Neuvik, specializing in penetration testing, red teaming, and adversary emulation. Passionate open-source contributor with extensive experience in offensive security technologies.
Learn moreJeff McJunkin, Rogue Valley InfoSec founder, has led Fortune 100 pen tests and shaped Core NetWars. His key role in SANS Holiday Hack Challenge and hands-on security innovations continue to elevate the industry, advancing defenses worldwide.
Learn moreLarry has revolutionized embedded device security with decades of hands-on offensive research, co-authoring SANS's flagship wireless and IoT penetration testing courses, and pioneering SBOM exploitation techniques for supply chain defense strategies.
Learn moreIn this role you will be challenged to look at problems and situations from the perspective of an adversary. The focus is on making the Blue Team better by testing and measuring the organization’s detection and response policies, procedures, and technologies. This role includes performing adversary emulation, a type of Red Team exercise where the Red Team emulates how an adversary operates, following the same tactics, techniques, and procedures (TTPs), with a specific objective similar to those of realistic threats or adversaries. It can also include creating custom implants and C2 frameworks to evade detection.
Explore learning pathIn this fairly recent job position, you have a keen understanding of both how cybersecurity defenses (“Blue Team”) work and how adversaries operate (“Red Team”). During your day-today activities, you will organize and automate emulation of adversary techniques, highlight possible new log sources and use cases that help increase the detection coverage of the SOC, and propose security controls to improve resilience against the techniques. You will also work to help coordinate effective communication between traditional defensive and offensive roles.
Explore learning pathApplication penetration testers probe the security integrity of a company’s applications and defenses by evaluating the attack surface of all in-scope vulnerable web-based services, clientside applications, servers-side processes, and more. Mimicking a malicious attacker, app pen testers work to bypass security barriers in order to gain access to sensitive information or enter a company’s internal systems through techniques such as pivoting or lateral movement.
Explore learning pathIn this role, you will work to find 0-days (unknown vulnerabilities) in a wide range of applications and devices used by organizations and consumers. Find vulnerabilities before the adversaries!
Explore learning pathWhen analyzing Android apps, we can choose to use either a real device or an emulator, however, for a very long time, the only option for iOS was a real device. Luckily, this has changed, and Corellium now offers iOS and Android virtualization which allows us to analyze applications from either OS on a virtualized device.
Over the last five years, most organizations have seen their exploitable attack surface grow dramatically as new processes — such as cloud-native software development — become mainstream. These changes have led to an explosion of new systems used to build applications and new security tools needed to scan them for vulnerabilities. Outdated approaches to vulnerability management simply can’t keep up.
Part 4 of this series will continue where Part 3 left off with the introduction of functions. For this part we will learn how how create functions that accept pointers as arguments, how to validate pointer arguments, SAL annotations, structures, and linked lists.
A lot of the traditional techniques we use for incident response, and digital forensics, are too slow when dealing with the challenges of scale and time in a modern intrusion.
Identities are the foundational cornerstone of many environments. Identity is typically the front door for web, infrastructure portals, and VPN services. Most organizations should implement additional countermeasures to prevent attackers from breaking into an organization. The perimeter of many environments is de-facto users’ identities. How you protect those identities is critical. Understanding how to attack identities is crucial for those who emulate attack groups.
Picking up where Part 4 left off, we will have linked list enumeration where we will look at a real world example of how knowing the underlying structure comes into play. After linked list enumeration, we can finally start to talk about some Windows internals, Windows APIs, and Windows specific structures.
After enumerating a list of loaded modules, it's only fitting to get started with what normally comes next, parsing exports of a DLL. Before we can do that, we will have to understand the anatomy of executable images. This means parsing PE headers. It would be great to have the following programs installed before this Part 6: WinDbg, PE Explorer by Pavel.PS: don't forget your files from Part 5; you'll need them!
Join SEC568: Product Security Penetration Testing - Safeguarding Supply Chains and Managing Third-Party Risk course author Douglas McKee for an insightful webcast presentation as he walks through the work flow of product security assessment depicted in the Overall Product Security Assessment Process poster.
Join Jorge Orchilles and Dave Mayer for this informative webcast as they guide you through the essential skills needed for a successful transition from pentesting to red teaming.
We’re opening up our Offensive Operations CTF to anyone who wants to join! This special virtual run of our CTF will be open for one day only, February 28th from 10:00am EST to 4:00pm EST.
Recent news of vulnerabilities in hardware appliances firmware such as Ivanti and Fortinet highlight the difficulty of securing complex digital supply chains. Having an in-depth understanding of what you put on your network is vital to implementing a zero-trust approach and managing risk appropriately.
On part 6 of the series we learned about the anatomy of executable images and parsing PE headers. We will continue with PE parsing and will explore a few more interesting areas of a PE file.
In this engaging session, participants will have the opportunity to delve into the world of incident response alongside SANS Instructor Phill Moore. Drawing from his wealth of experience, Phill will not only address inquiries surrounding the intricacies of being an incident responder but will also enrich the discussion with insightful anecdotes and real-world scenarios.
This presentation explores the dynamic landscape of securing Microsoft Azure by addressing the relationship between reconnaissance and password guessing.
Public Cloud Environments can make things, well, rather public. While there are ways to prevent this, and the cloud providers have made strides, retroactive changes are not a thing. As such, we still find very poorly configured environments today.
Join this webcast to explore SANS and GIAC's latest industry-leading training and certifications to help cyber-practitioners, and the organizations they protect, keep pace with dynamic market conditions. Cut through the noise with this comprehensive showcase and discover the skills you and your teams will need to navigate the evolving landscape of cybersecurity.
Join us for the inaugural year of SANS Emerging Technologies Track! Are you interested in learning more about new cutting-edge technology in the cybersecurity industry? This is the place for you!Learn from the best and brightest in the industry as selected organizations review their latest tools and solutions that will better equip you for your battle with the bad guys and assist you as your team works hard to keep networks safe from intrusions. This one day track will feature a comprehensive collection of use cases, demos, and solutions for everyday cyber professionals looking to take their arsenal of tools and solutions to the next level. Don't miss this track on April 17, register now!
In its fifth year, SANS Cyber Solutions Fest aims to brings together an ensemble of security professionals, solution providers, gurus and experts ready to share knowledge about the latest developments and innovative technologies in the cybersecurity industry.Join the Attack Surface & Vulnerability Management Track to hear from chairperson Matt Bromiley and a host of leading cyber security experts as they walk through specific use cases and challenges with the goal of helping you understand why your attack surface is critical for identifying and mitigating potential vulnerabilities in your digital presence and protecting systems from adversaries.As part of this forum, we'll look at technologies and techniques to help you proactively fortify your defenses and profile your attack surface before the adversaries take advantage of it.Forum Highlights: Discover how industry leading technologies and techniques can assist you with fortifying your existing attack surface and vulnerability management policies in the workplace Learn from industry leaders as they dive into cutting-edge use case studies and specific examples, while highlighting how the integration of technologies can provide unprecedented insights and advantages Interact with SANS chair Matt Bromiley, speakers and peers in the interactive Slack workspace by posting questions and discussing the forum topic
Threads, stacks, and heaps! Part 8 will take a look at using Windows APIs to create threads, heaps, and using a debugger to view stacks. We will also talk about some of the myths around stack growth versus stack usage.
Our applications and APIs are the gateways to our most sensitive and valuable data. As such, application and API security has become more and more essential to protecting our organizations. On this webcast, SANS certified instructor David Hazar will review the results of our 2024 AppSec/DevSecOps survey, and provide insight into:The best way to provide API securityInvestment trends in automated testing technologiesWhich tests are more important or more effective for APIsRegister for this webcast now, and you will automatically receive the companion white paper upon publication.
Transform your incident response skills; think like an attacker as you investigate cybersecurity incidents, develop threat intelligence, and apply defense strategies against real-world threats.