“I took the Active Directory Beginner and Advanced Red Team Courses for the CRTP/CRTE Certification. It was a blast of a training session and so much information that brought me forward in this area. Looking towards the Azure training. Can only recommend taking the trainings to everyone especially the bootcamps as with that amount of information you need more time to get it into your blood.”
About
Nikhil Mittal is a hacker, infosec researcher, speaker and enthusiast. His area of…
Activity
-
Hey everyone, excited to share my newest achievement... I became CRTP!! It definitely was a huge step from eJPTv2 (which coincidentally I took last…
Hey everyone, excited to share my newest achievement... I became CRTP!! It definitely was a huge step from eJPTv2 (which coincidentally I took last…
Liked by Nikhil Mittal
-
I successfully achieve CRTP certification exam. Thanks to Altered Security and to Nikhil Mittal for the great material and for the exam.
I successfully achieve CRTP certification exam. Thanks to Altered Security and to Nikhil Mittal for the great material and for the exam.
Liked by Nikhil Mittal
-
I'm happy to share that I've passed the Certified Red Team Professional (CRTP) exam! This journey has been both challenging and rewarding, and I’m…
I'm happy to share that I've passed the Certified Red Team Professional (CRTP) exam! This journey has been both challenging and rewarding, and I’m…
Liked by Nikhil Mittal
Experience
Education
Publications
-
RACE - Minimal Rights and ACE for Active Directory Dominance
DEF CON 27
My talk at DEFCON 27 on abusing ACLs and Security Descriptors in Active Directory for domain dominance.
-
Forging Trusts for Deception in Active Directory
BruCON
My talk at BruCON 2018 about using decoy AD objects for easy deception in Active Directory.
-
Hacked? Pray that the Attacker used PowerShell
ITDEFENSE 2018
The talk I gave at ITDefense 2018 on how PowerShell is useful for Blue Teams.
-
(Updated) Evading Microsoft ATA for Active Directory Domination
BruCON 2017
An updated talk I gave at BruCON 2017 on bypassing Microsoft Advanced Threat Analytics (ATA). I demonstrate techniques to bypass, avoid and attack ATA in this talk.
-
Red Team Revenge : Attacking Microsoft ATA
44CON 2017
The talk I gave at 44CON 2017 on identifying and targeting Microsoft Advanced Threat Analytics (ATA)
-
Evading Microsoft ATA for Active Directory Domination
BlackHat USA 2017
The talk I gave at Black Hat USA 2017 on bypassing Microsoft Advanced Threat Analytics (ATA). I demonstrate techniques to bypass, avoid and attack ATA in this talk.
-
PowerShell for Practical Purple Teaming
x33fcon 2017
Talk at x33fcon 2017 where I discuss use of PowerShell for Purple Teaming.
-
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
Black Hat USA 2016
A detailed discussion on detection capabilities of Microsoft Anti Malware Scan Interface (AMSI). The talk have live demonstrations on how AMSI improves security of Windows 10 boxes and how it can be bypassed and avoided.
-
Continuous Intrusion: Why CI tools are an Attacker's Best Friends
Black Hat Europe 2015
In this talk I discuss and demonstrate practical security risks posed by various CI tools to an enterprise network.
-
Lethal Client Side Attacks using PowerShell
DeepSec
The talk I gave at Deepsec 2014. It is about using PowerShell for Client Side Attacks like forged attachments and phishing.
-
PowerPreter: Post Exploitation Like a Boss
DEFCON 21
The talk I gave at Defocn 21 about Powerpreter, a post exploitation tool written in powershell.
-
Hacking the future with USB HID
RSA China
The talk I gave at RSA China. It was about using USB HID to hack Windows 8 and Mac OS X Mountain Lion.
-
Kautilya and Nishang
Black Hat USA
I talked about my two open source projects, Kautilya and Nishang at Black Hat USA. Nishang was demonstrated at the BHUSA Arsenal.
-
Creating Havoc using Human Interface Devices
PHDays
The workshop I did at PHDays, Moscow. It was all about using HIDs in Penetration Tests.
-
More fun using Kautilya
Troopers
A presentation I gave at Troopers'12. This featured some never seen before payloads for breaking into Linux using a Teesny device.
-
Teensy Programming for Everyone
Black Hat Europe
This was a workshop I coduncted at Black Hat Europe'12. The workshop explains how to program a USB HID, Teensy in this case, for usage in offensive security.
-
The Pwnage Saga Continues
Black Hat Europe
This was my presentation at Black Hat Europe'12. This showcased improvements and some new neat attack vectors added to Kautilya.
-
Kautilya: Teensy beyond shell
Black Hat Abu Dhabi
A paper which I presented at Black Hat Abu Dhabi. In this paper a toolkit called Kautilya was introduced which aims to make pwmage easier in Penetration Tests using Teensy. Kautilya is free and open source and can be downloaded from http://code.google.com/p/kautilya/
-
Maareech - Look its a HID made up of gold
Maareech is a PoC malware which is a combination of Teensy. Powershell scripts and executables. With limitations, this can be used as an autmoated Windows Domain takeover tool. It is an automated tool which if connected to a system in Win environment provides access to all systems in that domain.
-
Here are your keystrokes
Hackfest 2011
A talk by me which highlighted usage of Teensy in a Penetration test. it included overview of current status of Penetration Test and usage of Teensy for various PT activities.
-
Ultimate Pen Test - Compromising a highly secure environment
Clubhack 2010
Presentation detailing a Pen Test story of highly secure environment. The client environment was totally compromised which was secure by (almost) all industry standards and no detection of intrusion was traced.
-
Vxworks: Threat, Impact and Exploitability for Indian Cyber Space
Not published
My research on Vxworks vulnerabilities which were made public by HD Moore. The paper detailed an in depth assessment of 'Indian Cyberspace' which included scanning of nearly 2.7 million IP addresses and analysis of thousands of devices. Details were shared in a short format with CERT-In, but a reply was never received.
Projects
-
Nishang
- Present
Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security and post exploitation during Penetraion Tests.
-
Kautilya
- Present
Kautilya is a toolkit which provides various payloads for Human Interface Devices which may help in breaking in a computer. The toolkit contains nice customizable payloads for Windows 7 & above, Ubuntu and Mac OS X.
Languages
-
English
-
Recommendations received
-
LinkedIn User
3 people have recommended Nikhil
Join now to viewMore activity by Nikhil
-
We are delighted and very happy to have Altered Security on board this year as a Gold Sponsor! Thanks Nikhil Mittal for your support!!
We are delighted and very happy to have Altered Security on board this year as a Gold Sponsor! Thanks Nikhil Mittal for your support!!
Liked by Nikhil Mittal
-
Agradecemos a Altered Security. Gold Sponsor del Red Team Space en su quinta edición en el marco del aniversario de los 20 años de la Ekoparty…
Agradecemos a Altered Security. Gold Sponsor del Red Team Space en su quinta edición en el marco del aniversario de los 20 años de la Ekoparty…
Liked by Nikhil Mittal
-
"How Hackers Persist & Escalate Privileges in Entra ID/Microsoft 365" 🔥 -- a demo showcasing dynamic groups and adding a rogue guest to a tenant…
"How Hackers Persist & Escalate Privileges in Entra ID/Microsoft 365" 🔥 -- a demo showcasing dynamic groups and adding a rogue guest to a tenant…
Liked by Nikhil Mittal
-
We are excited to announce that SquareX Enterprise is now available on the CyberArk store - "Combining CyberArk's identity centric secure browser…
We are excited to announce that SquareX Enterprise is now available on the CyberArk store - "Combining CyberArk's identity centric secure browser…
Liked by Nikhil Mittal
-
Successfully cleared CESP-ADCS from Altered Security https://lnkd.in/gNumwK2s
Successfully cleared CESP-ADCS from Altered Security https://lnkd.in/gNumwK2s
Liked by Nikhil Mittal
-
الحمدلله دائما وبدا I am glad that I bypassed and obtained the Certified Red Team Expert Certification from Altered Security ! I have completed an…
الحمدلله دائما وبدا I am glad that I bypassed and obtained the Certified Red Team Expert Certification from Altered Security ! I have completed an…
Liked by Nikhil Mittal
-
Hello #connections I am delighted to share that I have attained a new certification Certified Azure Red Team Professional(CARTP) from Altered…
Hello #connections I am delighted to share that I have attained a new certification Certified Azure Red Team Professional(CARTP) from Altered…
Liked by Nikhil Mittal
-
Thanks a lot to Altered Security and Nikhil Mittal for all !!!
Thanks a lot to Altered Security and Nikhil Mittal for all !!!
Liked by Nikhil Mittal
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Nikhil Mittal in India
-
Nikhil Mittal
-
Nikhil Mittal
Talent Acquisition Specialist | Building High- Performing Teams | Recruitment Strategist | Leadership Hiring | Technical Hiring | Non Technical Hiring| Open for Collaborations!
-
Nikhil Mittal
-
NIKHIL MITTAL
-
Nikhil Mittal
Jamna Auto Industries | Supply Chain Management | Purchase Executive | M. Tech | Mechanical Engineer
415 others named Nikhil Mittal in India are on LinkedIn
See others named Nikhil Mittal