دسته: موسسه های دیگر

The RedTeam Blueprint course from RedTeam Nation is a very special course for people who want to start Red Team, APT or penetration testing. This course also teaches the basic topics related to hacking and security in the operating system as well as the network, and is completely suitable for people who do not have any background. Partners of this institute are SANS, Offensive Security and Microsoft.

ادامه مطلب

Maltego Essentials is the official video tutorial series that guides you through the basics of Maltego to help you kickstart your investigations. Watch these 10 bite-sized tutorials and quickly learn about the most important Maltego features now!

Syllabuss

1. Introducing The Official Maltego Video Tutorial Series

2. Editions of Maltego

3. How to Install and Activate Maltego

4. Running Your First Transform

5. How to Navigate your Graph

6. Different Layouts and Views of a Maltego Graph

7. What You Should Know About Entities in an Investigation

8. Notes, Bookmarks & Attachments

9. What Are Collection Nodes

10. How to Import Data into Maltego

Maltego Essentials Course

ادامه مطلب

This course will teach you the advanced features included in your Maltego Client. After this course, you will be able to create custom Entities, use the advanced options included with the Maltego Standard Transforms, and collaborate with colleagues.

Syllabus

  1. Introduction
  2. The Transform menu
  3. Advanced Infrastructure Transforms
  4. Data Integration
  5. Custom Entities
  6. Imports and Exports

Maltego Advanced

ادامه مطلب

This intermediate-level, 3-day-long intensive course dives deep into Modern Initial Access and Evasion tactics, which were effective on numerous engagements delivered in tightly monitored environments. The author will share his insights regarding strategies that made his malware accomplish engagement objectives, side by side with aggressively configured AVs & EDRs. Designing modern Red Team malware carriers smuggled in scripts, executables, and HTML websites are only some areas the course focuses on. We will explore numerous technical concepts and file formats. Craft advanced malicious Office documents, shellcode loaders, smuggling payloads, and other infected scripts that will help us reach target systems effectively. By applying modern AV & EDR evasion techniques into custom-crafted Red Team weaponry, capable teams will be equipped with the knowledge to succeed during adversary simulations even in the rapidly changing threat surface landscape. This course focuses on that – telling effective techniques apart from ones that no longer work.

Syllabus

Classic Initial Access

New Hope

Executables & Shellcode Loaders

Maldocs

Modern Initial Access and Evasion Tactics Training

ادامه مطلب

In this CSP course, you will apply all the knowledge and skills taught in the CSL course to crack real software.  Real software are commercial proprietary software.  We are doing this for educational purposes and not to harm software developers. This skill and knowledge benefits developers in that they are better able to secure their software. The concept is similar to ethical hacking – the only way to defend against hackers is to know how hackers break in. Similarly, for software security. The best way to improve software security is to learn how software is being cracked.

Syllabus

  1. Introduction
  2. Creating a Sandbox for Cracking Software
  3. Introduction to crackme’s
  4. Introduction to x64dbg and Detect it Easy (DIE)
  5. Setting up your cracking workspace and workflow
  6. Debugger Stepping Basics
  7. Stepping Into Calls
  8. Breakpoint
  9. Reversing Jumps
  10. How to patch a program
  11. Summary of Cracking Software Workflow
  12. Introduction to cracking gui-based programs
  13. Crack the Serial Key using BP on strings
  14. Windows api functions & the stack
  15. Patching to bypass wrong serial key message
  16. Setting Breakpoints on Intermodular Calls
  17. Setting BP from the Call Stack
  18. Cracking Registration File Checks
  19. Removing Nag Screens
  20. Cracking Trial Period Software
  21. Cracking Auto-Generated Serial Keys
  22. Removing Nag Screen by TDC
  23. Cracking by patching eax register values
  24. Cracking via Hardware Breakpoints
  25. How to Change Serial Key By Patching Memory Directly
  26. xAnalyzer Static Code Analyzer
  27. Serial Fishing – how to extract serial key
  28. Cracking Software Protection
  29. Cracking software using loaders
  30. Cracking Software’s Anti-Debugging Protection
  31. Cracking Software that has a combination of Packing Anti-Debugging
  32. Keygens
  33. Assembly Language Programming for Reversers
  34. Creating an External Keygen
  35. Cracking Visual Basic 6 Native compiled software
  36. Cracking VB6 p-code Software
  37. x64dbg tools usage
  38. Cracking .NET Framework Software (C# and VB.NET)
  39. Cracking .NET Software Protection
  40. Understanding the Process of De-obfuscation
  41. Cracking DLL’s

Cracking Software Practicals (CSP)

ادامه مطلب