Advanced Cyber War Boot Camp

Learn advanced persistence and data exfiltration in 5 days!


SecureNinja’s (5) five day Cyber War immersion course is heavily focused on advanced persistence and data exfiltration. Students will draw from the instructors extensive experience with multiple offensive groups (3-letter agencies, military, as well as groups from other nations) and this class covers a lot of the same things these groups wanted to learn as well as some new ways to do things (e.g. using powershell, or IPv6).


IT System Administrators, IT Security Professionals


This class is designed for advanced penetration testers, red teams, and offensive cyber operations groups.


  • 5 days


  • Exploit Development Boot Camp
  • Advanced Systems & Applications Attack & Defense


Day 1: Gaining Access From The Outside
  • Identifying/Bypassing External Security Mechanisms
    • Load Balancers
    • Intrusion Prevention Systems
    • Web Application Firewalls
  • Advanced Targeting & Exploitation
    • Email Address Harvesting
    • Client-Side Application Fingerprinting
    • Bypassing Anti-Virus
    • Dealing with Egress Filtering
    • Bypassing Authenticating Proxies
Day 2: Advanced Persistence
  • Persistence with and without Metasploit (Windows 7/8)
    • Advanced Meterpreter Features
    • Writing Meterpreter Post Modules
    • Building your own implant (non-meterpreter custom backdoor)
  • Advanced Tunneling (Windows 7/8)
    • Socks Tunneling
    • ICMP Tunneling
    • SSH Tunneling
    • IPV6 Tunneling
    • Direct Access
Day 3: Advanced Post-Exploitation & Data Exfiltration
  • Data-Mining Windows 7/8
    • Stealing hashes, Kerberos tickets, and passwords
    • Stealing User Certificates
    • Finding and Stealing Critical Data
    •  Attacking 2008/2012 Active Directory
    • Advanced Network Enumeration
    • Data-Mining 2008/2012 Active Directory with security settings enabled
    • Finding and attacking databases via Active Directory
  • Attacking Sharepoint
    • Version fingerprinting, directory brute-forcing, password stealing
    • Frontpage Access Files, DLLs, Virtual Directories
    • File upload vulnerabilities, command-execution vulnerabilities
Day 4: Data Exfiltration and Powershell For Hackers
  • Data Exfiltration
    • Aggregating files
    • Staging Serves
    • Dealing with network segmentation issues
  • Post-Exploitation With Powershell
    • Host Enumeration
    • Privilege Escalation
    • Stealing passwords and hashdumping
    • Network Enumeration
    • Download your toolkit to multiple hosts and execute it remotely   

Day 5: Cyber Operation

Get your sleep the night before, eat your Wheaties the morning of because you are about to participate in a Cyber Operation and it is gonna be intense! You will be tasked with finding and stealing data from a highly protected target network. You will be given a description of data that you must steal the target network that has a combination of hardened workstations (similar to a STIG), Anti-Virus and Host-Based Intrusion Prevention Systems. In addition to common technical challenges there will be a wide range of environmental variables that I’ve experienced on real operations to make it as realistic as possible.   


Joe McCray
Chief Technology Officer and Senior Cybersecurity Instructor

SecureNinja CTO Joe McCray is an Air Force Veteran and has been involved with cybersecurity for over 10 years. Joe has been involved in over 150 very high level pentesting assessments and utilizes his “real world hacking accomplishments”  to ensure his clients and students obtain effective knowledge transfer.

His extensive experience and deep knowledge, mixed with his comedic style has lead Joe to be one of the most highly sought after speaking experts in the industry. Joe often makes speaking appearances and gives seminars at major events in the security community such as Black Hat, DEFCON, BruCon, Hacker Halted, Hacktivity and more.

Joe is the recipient of the 2009 EC-Council Instructor Circle of Excellence Award and the 2010 EC-Council Instructor of the Year Award. In addition he is the founder and CEO of Strategic Security, Inc. an IT Security consulting firm that provides in-depth technical security assessments of your network, web application, and regulatory compliance gap analysis

Advanced Cyber War Boot Camp Classes Schedule
Aug. 27, 2018 Aug. 31, 2018 Columbia Mon-Fri OPEN Bootcamp

Not able to attend public scheduled classes? No problem, let us come to you to train your staff on-site on Advanced Cyber War Boot Camp