The Adversary Tactics: Mac Tradecraft course, hosted by SpecterOps, immerses participants in a modern macOS hybrid environment, closely resembling real-world red team exercises. This course is designed for experienced red team operators who want to enhance their skills in operating against macOS endpoints.

ادامه مطلب

The Red Team Infra Dev [CRT-ID] lab offered by cyberwarfare.live is a practical, hands-on learning environment designed to provide real-world experience in developing OPSEC safe Red Team Infrastructure. In this lab, you will learn how to utilize legitimate cloud and on-premise services for both internal and external operations. You will also create your own re-director and payload server. The lab features a professional Red Team attack case study, providing you with the opportunity to apply the skills you’ve learned in a realistic scenario.

Syllabus

OPSEC Safe Infra

Full-Fledged Initial Access Operations

Capture Credentials & Bypass Multi-Factor Authentication (MFA) via Adversary in the Middle Attack (AiTM)

Utilise Cloud & On-Premise Resources for Traffic Redirection

Red Team Infra Dev [CRT-ID]

ادامه مطلب

The Purple Team Analyst (CPTA V1) course offered by CyberWarFare Labs is an advanced cyber attack and detection learning platform. The course is designed to provide an in-depth understanding of various Web, Network, Host, and Active Directory-based attacks by various defensive solutions.

ادامه مطلب

The Process Injection Analyst (CPIA) course offered by CyberWarFare Labs is an advanced learning platform that focuses on cyber attack and detection. The course is designed to develop a mindset to perform process injection in the MS Windows Environment and analyze the events that are generated by different process injection techniques.

ادامه مطلب

The Hybrid Multi-Cloud Red Team Specialist (CHMRTS) course offered by CyberWarFare Labs is an advanced cyber attack and detection learning platform. The course is designed to provide an in-depth understanding of Hybrid Multi-Cloud core services, identification of misconfigurations, and methods to stealthily exploit them in an Enterprise Hybrid Multi-Cloud Environment.

ادامه مطلب