
Courses

Exploitation for Privilege Escalation
This hands-on lab covers the MITRE technique T1068 - Exploitation for Privilege Escalation. This technique involves an adversary exploiting a vulnerability with the objective of gaining higher privileges. Learners will practice simulating privilege escalation and using a SIEM to detect this attack.

CVE Series: Openfire (CVE-2023-32315)

Protocol Tunneling and Encrypted Channel
This hands-on lab is designed to equip learners with in-depth knowledge of protocol tunneling and encrypted channels - two critical techniques for secure and covert communication.

Ingress Tool Transfer
This hands-on lab provides a brief survey of the MITRE TTP T1105 technique. This technique involves using tools to transfer malicious files onto a target network and the techniques used to evade detection.

Exploit Public-Facing Application

Search Open Technical Databases: Scan Databases
Lucas is a seasoned threat researcher in multiple security disciplines, such as real-world adversarial tracking, network vulnerabilities, web exploitation, API abuse, and more. He began his career at the US Department of Defense, where he was trained by some of the world's best operators and analysts. Lucas now operates in the Cybrary red team, emulating real-world threat actors and running purple team exercises. He has 11 industry certifications, including the OSWA, GPEN, GAWN, GCFE, and RHCSA. He is also a member of the GIAC Advisory Board. In his free time, he enjoys working outdoors to improve his farm.