Astute Red Teaming

Basic Cross-Platform Ops

Study the methods of attack and defense and apply it to real-world scenarios via hands-on labs. We share with you the tactics, techniques, and procedures (TTPs) used in the wild and help you employ this knowledge in defense and detection of cyber attacks.

Training teaches red team operators how to do the following:

  • Setup Voodoo for Red Team engagements.

  • Gain Initial Access to Target Networks via Voodoo.

  • Leverage a Socks Proxy to Access Systems within the Target Network via a Pivot.

  • Easily Escalate Privileges on endpoints.

  • Pivoting deep into networks via Cross Platform (Windows, Linux, etc.) multi-hop chains.

  • And much more!

See our Voodoo page for more details on the Voodoo Pro feature set.

LOCATIONS

Virginia (D.C. Area)
1660 International Dr
Suite 600
McLean, VA 22102

New York

95 Public Square

Suite 201

Watertown, NY 13601

Utah

2901 Bluegrass Blvd

Suite 200-36

Lehi, UT 84043

QUICK LINKS

CONTACT US

Call Us
Email Us

© 2020 Stage 2 Security LLC

CONNECT WITH US

  • Stage 2 Security Twitter
  • Stage 2 Security LinkedIn