Founder-led · Sunny teaches this himself

Workshop · Intermediate → Advanced

4-day Red-Team Intensive

Full attack-chain on a live AD lab — recon, kerberoasting, BloodHound paths, lateral movement, C2 + exfil — with founder-signed certificate.

  • 4 days · 32 hours
  • Intermediate → Advanced
  • Internal red-teams, senior pentesters, consultancy leads
  • HSR Layout, Bengaluru
4-day Red-Team Intensive

Day-by-day

Agenda

  1. 1 Day 1 · Recon + Enumeration

    • OSINT-driven scoping
    • theHarvester / Maltego practical
    • Active Directory enum tooling
    • Lab setup walkthrough
  2. 2 Day 2 · Initial access + Privilege escalation

    • Phishing payload crafting (lab-safe)
    • Kerberoasting, AS-REP roasting
    • BloodHound graph attack paths
    • Token impersonation
  3. 3 Day 3 · Lateral movement + Persistence

    • Pass-the-hash / Pass-the-ticket
    • WMI / WinRM movement
    • Skeleton key + Golden ticket forging
    • Constrained-deleg abuse
  4. 4 Day 4 · C2 + Exfiltration + Reporting

    • Sliver C2 deployment
    • DNS / ICMP exfil channels
    • Detection-evasion fundamentals
    • Engagement report drafting

What you take home

Outcomes

Hands-on artefacts

Full attack-chain on a live AD lab — recon, kerberoasting, BloodHound paths, lateral movement, C2 + exfil — with founder-signed certificate.

Certificate

Founder-signed completion certificate · ID-verifiable via QR · listed under your TrikalDarshi account.

Lab-access window

30-day lab access continues post-workshop · daily reset · graded challenges.

Alumni Slack

Permanent invite to a private alumni Slack — engagement-stage Q&A, job referrals, CTF team-ups.