The RTFM Video Library is an invaluable resource for serious Red Team members who find themselves on critical missions. Led by a seasoned Red Team operator, this high-quality video series delves into various aspects of offensive security, providing practical guidance and insights.

Syllabus

1: Infrastructure Setup
2: Initial Access
3: Situational Awareness
4: User Level Persistence
5: Escalation
6: Lateral Movement
7: Active Directory Enumeration
8: Domain Fortification
9: Hunting for User Workstations
10: Active Directory Forest Compromise
11: Secret Enclave Compromise
12: Pivoting through Tunnels

RTFM – Red Team Field Manual

ادامه مطلب

Enterprises have been working tirelessly to improve their security postures through defense-in-depth approaches. Offensive teams have also been putting in long hours of research into bypassing the latest EDR’s and defensive products that keep them on their toes. Long gone “hopefully” are the days of hurdling an HTA file laced with a download cradle at a mature organization with a “Free iPad” ruse and watching your screen fill with incoming agents. An offense-in-depth approach may be applied to offensive practitioner’s looking for success against organizations well-versed in defending a large enterprise. Today’s organizations have assets in multiple geo regions, networks, cloud services, border hosts, and many of them are tied to the internal network in some way. This course aims to help offensive practitioners successfully exercise their client environments from a multi-faceted approach using the latest TTPs blended with esoteric practices to gain the upper hand on your assessments.

Antisyphon: Enterprise Attack Initial Access w/ Steve Borosh

ادامه مطلب

SEC455 designed to teach professionals how to build a Security Information and Event Management (SIEM) system from the ground up using the Elastic Stack.

ادامه مطلب

SEC455 designed to teach professionals how to build a Security Information and Event Management (SIEM) system from the ground up using the Elastic Stack.

ادامه مطلب

MGT512: Security Leadership Essentials for Managers designed to equip security leaders with both technical knowledge and leadership skills essential for managing modern security programs.

ادامه مطلب

This course is designed to provide forensic professionals with specialized techniques to analyze and investigate smartphones thoroughly. With mobile devices playing a significant role in daily communications, they often become key evidence sources in criminal, civil, or corporate investigations.

ادامه مطلب