Advanced Practical Initial Access (Social Engineering)

Posted By: ELK1nG

Advanced Practical Initial Access (Social Engineering)
Published 12/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.68 GB | Duration: 4h 33m

Learn Hands-On In Cyber-Security How Red Teamers & Threat Actors (APT) Phish for Initial Access in the Real World

What you'll learn

Ethical Hacking

Cyber Security

Phishing For Initial Access at a Deeper Level

Installing Kali Linux & Windows Virtual Machines

Building Undetectable Payloads that Bypasses A fully UpTo date Windows Defender 11 Using Villain, Metasploit Shellcode, C# Codes e.t.c

Phishing using Microsoft Documents

Phishing using Images

Phishing using HTA files

Obfuscating CSharp payloads

Obfuscating Malicious Documents

Obfuscating PowerShell One-Liners

Converting PowerShell One-Liner payloads to become executables

Obfuscating network traffic between C2 Framework and the target

Requirements

A computer with 16GB Ram to support 3 VMs running at the same time

Basic understanding of operating systems

Strong will to learn & Creative mindset

If you like doing it not theoretically, well this is the course for you, we do hands on here

Description

Cyber Security - Social EngineeringThis immersive, 250-word course description is for our course about Cyber Security titled "Advanced Tactics in Practical Initial Access and Network Penetration." This rigorous program is fabricated for information security experts seeking to master the art of initial access, a foundational and critical step in the cyber breach process.Dive into the challenging world of digital infiltration with our expertly crafted, scenario-based curriculum. This comprehensive course zeros in on advanced tactics that are used by cyber adversaries to establish a covert presence within target networks. Participants will dissect and reconstruct real-world attack vectors, understanding the intricate mechanisms behind successful initial access operations.Throughout the duration of the course, we place a significant emphasis on practical, hands-on learning. Pupils will engage with cutting-edge technology, going beyond theoretical knowledge to apply what they discover in realistic penetration testing environments. They will study under the guidiance of industry veterans, exploring key components such as social engineering mastery, exploitation of public-facing applications, sophisticated phishing techniques, and the art of circumventing modern security measures.We will delve into the nuances of attack methodologies such as weaponized document delivery, living-off-the-land tactics, and exploitation of zero-day vulnerabilities. Learning to recognize, exploit, and remediate such vulnerabilities provides our students with the capability to not only conduct advanced threat simulations but to also significantly bolster their own organizations’ defenses.On completing this course, you’ll emerge with the acumen to navigate the evolving threat landscape, equipped with the expertise to detect, respond to, and mitigate against sophisticated initial access threats—positioning you at the vanguard of cybersecurity defense.

Overview

Section 1: 1 - Introduction

Lecture 1 1 - Introduction

Section 2: 2 - Course Resources

Lecture 2 1 - Resourse File

Section 3: 3 - Setting Up The Lab

Lecture 3 1 - Installing Virtual Box

Lecture 4 2 - Downloading ISOs

Lecture 5 3 - Setting Up Machines On Virtual Box

Lecture 6 4 - Installing Kali Linux

Lecture 7 5 - Creating a root user & updating the system

Lecture 8 6 - Installing Windows Machines

Lecture 9 7 - Updating Windows Machines

Lecture 10 8 - Installing Visual Studio

Lecture 11 9 - Installing Microsoft Office

Section 4: 4 - Setting Up C2 Frameworks

Lecture 12 1 - Welcome

Lecture 13 2 - Setting Up MSF C2 FrameWork

Lecture 14 3 - Setting Up Villain C2 FrameWork

Section 5: 5 - Notes Taking

Lecture 15 1 - Note Keeping Tools

Lecture 16 2 - How I Take Notes

Section 6: 6 - Crafting Undetected Payloads

Lecture 17 1 - Welcome

Lecture 18 2 - Installing Sublime Text

Lecture 19 3 - Modfying Villain Payloads Technique 1

Lecture 20 4 - Modfying Villain Payloads Technique 2

Lecture 21 5 - Modfying Villain Payloads Technique 3

Lecture 22 6 - Modfying Villain To Output The Undetected Payloads

Lecture 23 7 - Correcting A Mistake

Lecture 24 8 - Does Our Payloads Works On Win 11 Defender

Lecture 25 9 - Taking A Step Further

Lecture 26 10 - Coverting Powershell Payloads To Become Executables

Lecture 27 11 - Let's Move To Visual Studio

Lecture 28 12 - Building An Undetected C# Payload

Lecture 29 13 - Testing The Payload On Windows 11 Defender

Lecture 30 14 - Obfucating Our C# Payloads

Lecture 31 15 - C# Code Review

Lecture 32 16 - End Of This Chapter

Section 7: 7 - HTA Attacks

Lecture 33 1 - Welcome

Lecture 34 2 - HTA Attack Technique 1

Lecture 35 3 - HTA Attack Technique 2

Lecture 36 4 - HTA Attack Technique 3

Lecture 37 5 - End Of The Chapter

Section 8: 8 - Image Attacks

Lecture 38 1 - Welcome

Lecture 39 2 - Image Attack Technique 1

Lecture 40 3 - Image Attack Technique 2

Lecture 41 4 - Image Attack Technique 3 (Golden Attack)

Lecture 42 5 - End Of The Chapter

Section 9: 9 - Office Attacks

Lecture 43 1 - Welcome

Lecture 44 2 - Office Word Attack Technique 1

Lecture 45 3 - Office Word Attack Technique 2 (Golden Attack)

Lecture 46 4 - Obfuscating Our Malicious Documents

Lecture 47 5 - End OF The Chapter

Section 10: 10 - HTML Smuggling

Lecture 48 1 - Welcome

Lecture 49 2 - HTML Smuggling Attack Technique 1

Lecture 50 3 - HTML Smuggling Attack Technique 2

Lecture 51 4 - End Of The Chapter

Section 11: 11 - Hunting Emails

Lecture 52 1 - Welcome

Lecture 53 2 - Hunting Email Addresses

Section 12: 12 - Course Untro

Lecture 54 1 - Course Finale

Red Teamers - Leveling their skills in their world of compromising systems & phishing for Initial Access,Blue Teamer - Learn how threat actors work or move in the wild, so they can defend better, protect their systems and educate their fellow workers for better security,Any One - Off course, anyone in the Cyber Security field who just wanna learn or know how threat actors act in the wild