دسته: موسسه های دیگر

This course will teach you the advanced features included in your Maltego Client. After this course, you will be able to create custom Entities, use the advanced options included with the Maltego Standard Transforms, and collaborate with colleagues.

Syllabus

  1. Introduction
  2. The Transform menu
  3. Advanced Infrastructure Transforms
  4. Data Integration
  5. Custom Entities
  6. Imports and Exports

Maltego Advanced

ادامه مطلب

This intermediate-level, 3-day-long intensive course dives deep into Modern Initial Access and Evasion tactics, which were effective on numerous engagements delivered in tightly monitored environments. The author will share his insights regarding strategies that made his malware accomplish engagement objectives, side by side with aggressively configured AVs & EDRs. Designing modern Red Team malware carriers smuggled in scripts, executables, and HTML websites are only some areas the course focuses on. We will explore numerous technical concepts and file formats. Craft advanced malicious Office documents, shellcode loaders, smuggling payloads, and other infected scripts that will help us reach target systems effectively. By applying modern AV & EDR evasion techniques into custom-crafted Red Team weaponry, capable teams will be equipped with the knowledge to succeed during adversary simulations even in the rapidly changing threat surface landscape. This course focuses on that – telling effective techniques apart from ones that no longer work.

Syllabus

Classic Initial Access

New Hope

Executables & Shellcode Loaders

Maldocs

Modern Initial Access and Evasion Tactics Training

ادامه مطلب

In this CSP course, you will apply all the knowledge and skills taught in the CSL course to crack real software.  Real software are commercial proprietary software.  We are doing this for educational purposes and not to harm software developers. This skill and knowledge benefits developers in that they are better able to secure their software. The concept is similar to ethical hacking – the only way to defend against hackers is to know how hackers break in. Similarly, for software security. The best way to improve software security is to learn how software is being cracked.

ادامه مطلب

Cracking Software Legally (CSL) course is reverse engineering training and software penetration testing legally. In this course, you will learn about reverse engineering and Assembly language. Also, this course will provide valuable information for people who work in the field of Malware Analysis and Exploit Development. Gives.

Syllabus

  1. Introduction
  2. Creating a Sandbox for Cracking Software
  3. Introduction to crackme’s
  4. Introduction to x64dbg and Detect it Easy (DIE)
  5. Setting up your cracking workspace and workflow
  6. Debugger Stepping Basics
  7. Stepping Into Calls
  8. Breakpoint
  9. Reversing Jumps
  10. How to patch a program
  11. Summary of Cracking Software Workflow
  12. Introduction to cracking gui-based programs
  13. Analyzing the PE for a gui-based program
  14. Crack the Serial Key using BP on strings
  15. Windows api functions & the stack
  16. Patching to bypass wrong serial key message
  17. Setting Breakpoints on Intermodular Calls
  18. Setting BP from the Call Stack
  19. Cracking Registration File Checks
  20. Removing Nag Screens
  21. Cracking Trial Period Software
  22. Cracking Auto-Generated Serial Keys
  23. Removing Nag Screen by TDC
  24. Cracking by patching eax register values
  25. Cracking via Hardware Breakpoints
  26. How to Change Serial Key By Patching Memory Directly
  27. xAnalyzer Static Code Analyzer
  28. Serial Fishing – how to extract serial key
  29. Cracking Software Protection
  30. Cracking software using loaders
  31. Cracking Software’s Anti-Debugging Protection
  32. Cracking Software that has a combination of Packing Anti-Debugging
  33. Keygens
  34. Assembly Language Programming for Reversers
  35. Creating an External Keygen
  36. Cracking Visual Basic 6 Native compiled software
  37. Cracking VB6 p-code Software
  38. x64dbg tools usage
  39. Cracking .NET Framework Software (C# and VB.NET)
  40. Cracking .NET Software Protection
  41. Understanding the Process of De-obfuscation
  42. Cracking DLL’s

Cracking Software Legally (CSL)

ادامه مطلب

The ability to perform digital investigations and incident response is a critical skill for many occupations. Unfortunately, digital investigators frequently lack the training or experience to take advantage of the volatile artifacts found in physical memory. Volatile memory contains valuable information about the runtime state of the system, provides the ability to link artifacts from traditional forensic analysis (network, file system, registry), and provides the ability to ascertain investigative leads that have been unbeknownst to most analysts. Malicious adversaries have been leveraging this knowledge disparity to undermine many aspects of the digital investigation process with such things as anti-forensics techniques, memory resident malware, kernel rootkits, and encryption (file systems, network traffic, etc.). The only way to turn-the-tables and defeat a creative digital human adversary is through talented analysts.

This course demonstrates why memory forensics is a critical component of the digital investigation process and how investigators can gain the upper hand. The course will consist of lectures on specific topics in Windows, Linux, and Mac OS X memory forensics followed by intense hands-on exercises to put the topics into real world contexts. Our goal is to give you practical experience with all the major facets of memory analysis. For example, you’ll defeat disk encryption, recover cached passwords, investigate insider theft, compliment network forensics with data you find in memory, and hunt for attackers throughout corporate networks. We still leave enough room for detecting common RATs and hacker tools, reversing packed/compressed malicious code, and generating timelines from memory. You’ll even customize your own automated memory artifact scanner and engage in a fast-paced, challenging CTF that involves corroborating evidence across multiple memory samples (i.e., Windows PCs, Linux servers).

Memory Analysis: Malware and Memory Forensics Training

ادامه مطلب

This course teaches the foundations of satellite cybersecurity by guiding you through the reconnaissance, communication dissection, decoding, and vulnerability analysis of satellite systems through interactive activities and tutorials. Learn about the underlying concepts of what makes satellite network infrastructure function and apply your knowledge to conduct digital forensics on real life satellites in orbit.

Syllabus

Satellite Reconnaissance

Communication Analysis and Eavesdropping

Reverse Engineering and Decoding Communication

Vulnerabilities and Attacks

Aerospace Cybersecurity: Satellite Hacking (W53)

ادامه مطلب