Course - RED TEAM Operator Windows Persistence
In large organizations, two key teams play crucial roles in their cybersecurity strategies: the Red Team and the Blue Team. These teams operate akin to sparring partners, but with a distinct purpose. The Red Team specializes in offensive tactics, such as hacking and launching attacks, while the Blue Team is responsible for defending against the Red Team's incursions.
As the company prioritizes enhancing its security measures, this initiative proves highly beneficial. The Red Team must swiftly and comprehensively acquire a diverse set of skills, including coding, as well as gain a deep understanding of malware and web application attacks. If you're part of a company, consider adopting this approach to bolster your security efforts and stay ahead of potential threats.
List Content and Included File Document and Assignments :
** 1 - Intro **
01 - Introduction to Windows Persistence
02 - Intro Addendum
03 - Course VM Setup
** 2 - Low Privilege Persistence **
04 - Start Folder and Registry Keys
05 - Logon Scripts
06 - Shortcut Mods
07 - Screensavers
08 - Powershell Profile
09 - DLL Proxying - Introduction
10 - DLL Proxying - Demo
11 - Component Object Model - Introduction
12 - COMs Registry
13 - COM Hijacks and Proxies
** 3 - Admin Level Persistence **
14 - Elevated Scheduled Tasks
15 - Multiaction Tasks
16 - Modified Services
17 - IFEO - Debugger - SilentProcessExit - Verifier
18 - Application Shims
19 - Windows Management Instrumentation - Introduction
20 - WMI Event Subscription
21 - AppCert DLLs
22 - AppInit DLLs
23 - Netsh Helper DLLs
24 - Winlogon - SHELL-USERINIT
25 - Time Providers
26 - Port Monitors
27 - Local Security Authority - Introduction
28 - LSA-as-a-Persistence - SSPs
29 - LSA-as-a-Persistence - Password Filters
** 4 - Assignments **
ass1.txt
ass2.txt
ass3.txt
ass4.txt
DOWNLOAD :
Password : blackhatwoorld
A very important warning, these products are for educational purposes only, and we do not tolerate any other activities that violate the laws.
Recommended: VPS, Sandboxie or Virtual Machine.
Um aviso muito importante, esses produtos são apenas para fins educacionais e não toleramos nenhuma outra atividade que viole as leis.
Recomendado: VPS, Sandboxie ou Máquina Virtual.
تحذير مهم جدًا، هذه المنتجات مخصصة لأغراض تعليمية فقط، ولا نتسامح مع أي أنشطة أخرى تنتهك القوانين.
Tags
Leaked Courses