دسته: دوره ها

The Certified Enterprise Security Controls Attack Specialist [CESC-AS] course from the cyberwarfare institute is a Red Team-style hacking and security training at the level of organizations and companies. This is a hands-on training course specifically designed for people interested in high-level, organized Red Teaming operations.

Syllabus

Hands-on of Enterprise Security Controls

Implementation of Security Controls

Offensive C# Tradecraft

Abusing Windows API

Abusing/Evading Host & Network based security controls

CWL: Enterprise Security Controls Attack Specialist

ادامه مطلب

In this CSP course, you will apply all the knowledge and skills taught in the CSL course to crack real software.  Real software are commercial proprietary software.  We are doing this for educational purposes and not to harm software developers. This skill and knowledge benefits developers in that they are better able to secure their software. The concept is similar to ethical hacking – the only way to defend against hackers is to know how hackers break in. Similarly, for software security. The best way to improve software security is to learn how software is being cracked.

Syllabus

  1. Introduction
  2. Creating a Sandbox for Cracking Software
  3. Introduction to crackme’s
  4. Introduction to x64dbg and Detect it Easy (DIE)
  5. Setting up your cracking workspace and workflow
  6. Debugger Stepping Basics
  7. Stepping Into Calls
  8. Breakpoint
  9. Reversing Jumps
  10. How to patch a program
  11. Summary of Cracking Software Workflow
  12. Introduction to cracking gui-based programs
  13. Crack the Serial Key using BP on strings
  14. Windows api functions & the stack
  15. Patching to bypass wrong serial key message
  16. Setting Breakpoints on Intermodular Calls
  17. Setting BP from the Call Stack
  18. Cracking Registration File Checks
  19. Removing Nag Screens
  20. Cracking Trial Period Software
  21. Cracking Auto-Generated Serial Keys
  22. Removing Nag Screen by TDC
  23. Cracking by patching eax register values
  24. Cracking via Hardware Breakpoints
  25. How to Change Serial Key By Patching Memory Directly
  26. xAnalyzer Static Code Analyzer
  27. Serial Fishing – how to extract serial key
  28. Cracking Software Protection
  29. Cracking software using loaders
  30. Cracking Software’s Anti-Debugging Protection
  31. Cracking Software that has a combination of Packing Anti-Debugging
  32. Keygens
  33. Assembly Language Programming for Reversers
  34. Creating an External Keygen
  35. Cracking Visual Basic 6 Native compiled software
  36. Cracking VB6 p-code Software
  37. x64dbg tools usage
  38. Cracking .NET Framework Software (C# and VB.NET)
  39. Cracking .NET Software Protection
  40. Understanding the Process of De-obfuscation
  41. Cracking DLL’s

Cracking Software Practicals (CSP)

ادامه مطلب

Cracking Software Legally (CSL) course is reverse engineering training and software penetration testing legally. In this course, you will learn about reverse engineering and Assembly language. Also, this course will provide valuable information for people who work in the field of Malware Analysis and Exploit Development. Gives.

Syllabus

  1. Introduction
  2. Creating a Sandbox for Cracking Software
  3. Introduction to crackme’s
  4. Introduction to x64dbg and Detect it Easy (DIE)
  5. Setting up your cracking workspace and workflow
  6. Debugger Stepping Basics
  7. Stepping Into Calls
  8. Breakpoint
  9. Reversing Jumps
  10. How to patch a program
  11. Summary of Cracking Software Workflow
  12. Introduction to cracking gui-based programs
  13. Analyzing the PE for a gui-based program
  14. Crack the Serial Key using BP on strings
  15. Windows api functions & the stack
  16. Patching to bypass wrong serial key message
  17. Setting Breakpoints on Intermodular Calls
  18. Setting BP from the Call Stack
  19. Cracking Registration File Checks
  20. Removing Nag Screens
  21. Cracking Trial Period Software
  22. Cracking Auto-Generated Serial Keys
  23. Removing Nag Screen by TDC
  24. Cracking by patching eax register values
  25. Cracking via Hardware Breakpoints
  26. How to Change Serial Key By Patching Memory Directly
  27. xAnalyzer Static Code Analyzer
  28. Serial Fishing – how to extract serial key
  29. Cracking Software Protection
  30. Cracking software using loaders
  31. Cracking Software’s Anti-Debugging Protection
  32. Cracking Software that has a combination of Packing Anti-Debugging
  33. Keygens
  34. Assembly Language Programming for Reversers
  35. Creating an External Keygen
  36. Cracking Visual Basic 6 Native compiled software
  37. Cracking VB6 p-code Software
  38. x64dbg tools usage
  39. Cracking .NET Framework Software (C# and VB.NET)
  40. Cracking .NET Software Protection
  41. Understanding the Process of De-obfuscation
  42. Cracking DLL’s

Cracking Software Legally (CSL)

ادامه مطلب

This risk management course is specifically designed to guide a CISO in defining and implementing a risk management approach within an IS program. The course introduces the student to the most common approaches and practices used by organizations worldwide. It is not intended to cover risk outside of the IS enterprise (including financial and business risks).

ادامه مطلب

EC-Council’s Certified Incident Handler program equips students with the knowledge, skills, and abilities to effectively prepare for, deal with, and eradicate threats and threat actors in an incident. This ANAB-Accredited and US DoD 8140 approved program provides the entire process of Incident Handling and Response and hands-on labs that teach the tactical procedures and techniques required to effectively Plan, Record, Triage, Notify and Contain. Students will learn the handling of various types of incidents, risk assessment methodologies, as well as laws and policies related to incident handling. After attending the course, students will be able to create IH&R policies and deal with different types of security incidents such as malware, email security, network security, web application security, cloud security, and insider threat-related incidents.

ادامه مطلب