Advanced Practical Initial Access (Social Engineering)
Published 12/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.68 GB | Duration: 4h 33m
Published 12/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.68 GB | Duration: 4h 33m
Learn Hands-On In Cyber-Security How Red Teamers & Threat Actors (APT) Phish for Initial Access in the Real World
What you'll learn
Ethical Hacking
Cyber Security
Phishing For Initial Access at a Deeper Level
Installing Kali Linux & Windows Virtual Machines
Building Undetectable Payloads that Bypasses A fully UpTo date Windows Defender 11 Using Villain, Metasploit Shellcode, C# Codes e.t.c
Phishing using Microsoft Documents
Phishing using Images
Phishing using HTA files
Obfuscating CSharp payloads
Obfuscating Malicious Documents
Obfuscating PowerShell One-Liners
Converting PowerShell One-Liner payloads to become executables
Obfuscating network traffic between C2 Framework and the target
Requirements
A computer with 16GB Ram to support 3 VMs running at the same time
Basic understanding of operating systems
Strong will to learn & Creative mindset
If you like doing it not theoretically, well this is the course for you, we do hands on here
Description
Cyber Security - Social EngineeringThis immersive, 250-word course description is for our course about Cyber Security titled "Advanced Tactics in Practical Initial Access and Network Penetration." This rigorous program is fabricated for information security experts seeking to master the art of initial access, a foundational and critical step in the cyber breach process.Dive into the challenging world of digital infiltration with our expertly crafted, scenario-based curriculum. This comprehensive course zeros in on advanced tactics that are used by cyber adversaries to establish a covert presence within target networks. Participants will dissect and reconstruct real-world attack vectors, understanding the intricate mechanisms behind successful initial access operations.Throughout the duration of the course, we place a significant emphasis on practical, hands-on learning. Pupils will engage with cutting-edge technology, going beyond theoretical knowledge to apply what they discover in realistic penetration testing environments. They will study under the guidiance of industry veterans, exploring key components such as social engineering mastery, exploitation of public-facing applications, sophisticated phishing techniques, and the art of circumventing modern security measures.We will delve into the nuances of attack methodologies such as weaponized document delivery, living-off-the-land tactics, and exploitation of zero-day vulnerabilities. Learning to recognize, exploit, and remediate such vulnerabilities provides our students with the capability to not only conduct advanced threat simulations but to also significantly bolster their own organizations’ defenses.On completing this course, you’ll emerge with the acumen to navigate the evolving threat landscape, equipped with the expertise to detect, respond to, and mitigate against sophisticated initial access threats—positioning you at the vanguard of cybersecurity defense.
Overview
Section 1: 1 - Introduction
Lecture 1 1 - Introduction
Section 2: 2 - Course Resources
Lecture 2 1 - Resourse File
Section 3: 3 - Setting Up The Lab
Lecture 3 1 - Installing Virtual Box
Lecture 4 2 - Downloading ISOs
Lecture 5 3 - Setting Up Machines On Virtual Box
Lecture 6 4 - Installing Kali Linux
Lecture 7 5 - Creating a root user & updating the system
Lecture 8 6 - Installing Windows Machines
Lecture 9 7 - Updating Windows Machines
Lecture 10 8 - Installing Visual Studio
Lecture 11 9 - Installing Microsoft Office
Section 4: 4 - Setting Up C2 Frameworks
Lecture 12 1 - Welcome
Lecture 13 2 - Setting Up MSF C2 FrameWork
Lecture 14 3 - Setting Up Villain C2 FrameWork
Section 5: 5 - Notes Taking
Lecture 15 1 - Note Keeping Tools
Lecture 16 2 - How I Take Notes
Section 6: 6 - Crafting Undetected Payloads
Lecture 17 1 - Welcome
Lecture 18 2 - Installing Sublime Text
Lecture 19 3 - Modfying Villain Payloads Technique 1
Lecture 20 4 - Modfying Villain Payloads Technique 2
Lecture 21 5 - Modfying Villain Payloads Technique 3
Lecture 22 6 - Modfying Villain To Output The Undetected Payloads
Lecture 23 7 - Correcting A Mistake
Lecture 24 8 - Does Our Payloads Works On Win 11 Defender
Lecture 25 9 - Taking A Step Further
Lecture 26 10 - Coverting Powershell Payloads To Become Executables
Lecture 27 11 - Let's Move To Visual Studio
Lecture 28 12 - Building An Undetected C# Payload
Lecture 29 13 - Testing The Payload On Windows 11 Defender
Lecture 30 14 - Obfucating Our C# Payloads
Lecture 31 15 - C# Code Review
Lecture 32 16 - End Of This Chapter
Section 7: 7 - HTA Attacks
Lecture 33 1 - Welcome
Lecture 34 2 - HTA Attack Technique 1
Lecture 35 3 - HTA Attack Technique 2
Lecture 36 4 - HTA Attack Technique 3
Lecture 37 5 - End Of The Chapter
Section 8: 8 - Image Attacks
Lecture 38 1 - Welcome
Lecture 39 2 - Image Attack Technique 1
Lecture 40 3 - Image Attack Technique 2
Lecture 41 4 - Image Attack Technique 3 (Golden Attack)
Lecture 42 5 - End Of The Chapter
Section 9: 9 - Office Attacks
Lecture 43 1 - Welcome
Lecture 44 2 - Office Word Attack Technique 1
Lecture 45 3 - Office Word Attack Technique 2 (Golden Attack)
Lecture 46 4 - Obfuscating Our Malicious Documents
Lecture 47 5 - End OF The Chapter
Section 10: 10 - HTML Smuggling
Lecture 48 1 - Welcome
Lecture 49 2 - HTML Smuggling Attack Technique 1
Lecture 50 3 - HTML Smuggling Attack Technique 2
Lecture 51 4 - End Of The Chapter
Section 11: 11 - Hunting Emails
Lecture 52 1 - Welcome
Lecture 53 2 - Hunting Email Addresses
Section 12: 12 - Course Untro
Lecture 54 1 - Course Finale
Red Teamers - Leveling their skills in their world of compromising systems & phishing for Initial Access,Blue Teamer - Learn how threat actors work or move in the wild, so they can defend better, protect their systems and educate their fellow workers for better security,Any One - Off course, anyone in the Cyber Security field who just wanna learn or know how threat actors act in the wild