Masterclass: Hacking Windows Infrastructure Training in Hong Kong

  • Learn via: Virtual Classroom
  • Duration: 2 Days
  • Price: Please contact for booking options
We can host this training at your preferred location. Contact us!

In this workshop you will investigate the critical tasks for a high-quality penetration test. We’ll look at the most efficient ways to map a network and discover target systems and services. Once it has been done, we will search for vulnerabilities and reduce false positives with manual vulnerability verification. At the end we will look at exploitation techniques, including the use of authored and commercial tools. In the attack summary we will always go through the securing techniques. 


We really want you to leave from the class with practical, ready-to-use knowledge of how to get into the infrastructure. 


Exploits are not the only way to get to systems! We will go through the operating systems’ build in problems and explore how they can be beneficial for hackers! One of the most important things to conduct a successful attack is to understand how the targets work. To the bones! Afterwards everything is clear and the tool is just a matter of our need.


The course covers all aspects of Windows infrastructure security from the hacker’s mind perspective! Our goal is to show and teach you what kind of mechanisms are allowing to get inside the infrastructure and how to get into operating systems. After the course you will gain penetration tester’s knowledge and tools. To get more practice we offer three extra weeks of labs online! 


The course is an intense workshop! During this workshop we provide caffeine candies – this course is really intense and in order not to miss a thing you MUST stay awake! 


All exercises are based on Windows Server 2016 and 2019, Windows 10 and Kali Linux. This course is based on practical knowledge from tons of successful projects, many years of real-world experience and no mercy for misconfigurations or insecure solutions!


To attend this training, you should have a good hands-on experience in administering Windows infrastructure. At least 8 years in the field is recommended.

Enterprise administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security.

Module 1: Hacking Windows Platform 

a) Detecting unnecessary services 

b) Misusing service accounts 

c) Implementing rights, permissions and privileges 

d) Direct Kernel Object Modification 


Module 2: Top 50 tools: the attacker's best friends 

a) Practical walkthrough through tools 

b) Using tools against scenarios 

c) Tools for Red Team / Pentesters 


Module 3: Modern Malware 

a) Techniques used by modern malware 

b) Advanced Persistent Threats 

c) Fooling common protection mechanisms 


Module 4: Physical Access 

a) Misusing USB and other ports 

b) Offline Access techniques 

c) BitLocker unlocking 


Module 5: Intercepting Communication 

a) Communicating through firewalls 

b) Misusing Remote Access 

c) DNS based attacks 


Module 6: Hacking Web Server 

a) Detecting unsafe servers 

b) Hacking HTTPS 

c) Distributed Denial of Service attacks 


Module 7: Data in-Security 

a) File format attacks for Microsoft Office, PDF and other file types 

b) Using incorrect file servers’ configuration 

c) Basic SQL Server attacks 


Module 8: Identity attacks 

a) Pass-the-Hash attacks 

b) Stealing the LSA Secrets 

c) Modern identity attacks techniques 


Module 9: Hacking automation 

a) Misusing administrative scripts 

b) Script based scanning 

c) PowerShell for pen-testers 



Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Hong Kong facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

Classroom / Virtual Classroom
22 May 2024
Hong Kong, Kowloon, Tsuen Wan
2 Days
Classroom / Virtual Classroom
23 May 2024
Hong Kong, Kowloon, Tsuen Wan
2 Days
Classroom / Virtual Classroom
13 June 2024
Hong Kong, Kowloon, Tsuen Wan
2 Days
Classroom / Virtual Classroom
24 June 2024
Hong Kong, Kowloon, Tsuen Wan
2 Days
Classroom / Virtual Classroom
26 June 2024
Hong Kong, Kowloon, Tsuen Wan
2 Days
Classroom / Virtual Classroom
20 July 2024
Hong Kong, Kowloon, Tsuen Wan
2 Days
Classroom / Virtual Classroom
09 August 2024
Hong Kong, Kowloon, Tsuen Wan
2 Days
Classroom / Virtual Classroom
06 September 2024
Hong Kong, Kowloon, Tsuen Wan
2 Days
Masterclass: Hacking Windows Infrastructure Training Course in Hong Kong

Hong Kong is officially known as the Hong Kong Special Administrative Region of the People's Republic of China (HKSAR) and is a city and special administrative region of China on the eastern Pearl River Delta in South China. Hong Kong is one of the most densely populated places in the world, with over 7.5 million population. The official languages of the HKSAR are Chinese and English. Hong Kong is a highly developed territory and ranks fourth on the United Nations Human Development Index and the residents of Hong Kong have the highest life expectancies in the world.

The best time to visit Hong Kong is from September to December, since the temperatures, averaging between 19 to 28 degree Celsius. During this outdoor activities-friendly travelling season, you can take a walk along Victoria Harbour, visit the islands of Lantau, Lamma and Cheung Chau and participate in the Mid-Autumn Festival. Top choices of the tourists to visit in Hong Kong are Big Buddha statue, Wong Tai Sin Temple, Repulse Bay and the Beaches and Hong Kong Disneyland.

Explore our diverse range of IT courses, encompassing programming, software development, cyber security, data science, business skills, and Agile/Scrum. Wherever you are in Hong Kong, our seasoned instructors will bring practical training and expert knowledge to your preferred training venue.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.