برچسب: Pentest

The RTFM Video Library is an invaluable resource for serious Red Team members who find themselves on critical missions. Led by a seasoned Red Team operator, this high-quality video series delves into various aspects of offensive security, providing practical guidance and insights.

Syllabus

1: Infrastructure Setup
2: Initial Access
3: Situational Awareness
4: User Level Persistence
5: Escalation
6: Lateral Movement
7: Active Directory Enumeration
8: Domain Fortification
9: Hunting for User Workstations
10: Active Directory Forest Compromise
11: Secret Enclave Compromise
12: Pivoting through Tunnels

RTFM – Red Team Field Manual

ادامه مطلب

Enterprises have been working tirelessly to improve their security postures through defense-in-depth approaches. Offensive teams have also been putting in long hours of research into bypassing the latest EDR’s and defensive products that keep them on their toes. Long gone “hopefully” are the days of hurdling an HTA file laced with a download cradle at a mature organization with a “Free iPad” ruse and watching your screen fill with incoming agents. An offense-in-depth approach may be applied to offensive practitioner’s looking for success against organizations well-versed in defending a large enterprise. Today’s organizations have assets in multiple geo regions, networks, cloud services, border hosts, and many of them are tied to the internal network in some way. This course aims to help offensive practitioners successfully exercise their client environments from a multi-faceted approach using the latest TTPs blended with esoteric practices to gain the upper hand on your assessments.

Antisyphon: Enterprise Attack Initial Access w/ Steve Borosh

ادامه مطلب

SEC760 is an intensive six-day course designed to equip security professionals with the expertise to discover and exploit vulnerabilities in modern operating systems, including Windows 10 and 11, as well as contemporary Linux environments.

ادامه مطلب

This course is designed for seasoned penetration testers and cybersecurity professionals looking to elevate their skills in offensive security. It focuses on advanced exploitation techniques and complex attack vectors, enabling participants to uncover and exploit vulnerabilities in a wide range of systems and networks.

ادامه مطلب

SEC617 focuses on teaching ethical hacking techniques specifically related to wireless networks. The course provides in-depth knowledge and practical skills required to perform wireless penetration testing on various types of wireless technologies like Wi-Fi and Bluetooth.

ادامه مطلب

This course provides an in-depth exploration of penetration testing techniques tailored to modern cloud environments. Participants will gain hands-on experience identifying vulnerabilities, exploiting weaknesses, and understanding the unique attack vectors that cloud infrastructures introduce. Covering leading platforms such as AWS, Azure, and Google Cloud, SEC588 emphasizes real-world scenarios, enabling students to assess and secure cloud systems effectively. With a focus on both offensive and defensive strategies, the course equips cybersecurity professionals with the tools to stay ahead in a rapidly evolving threat landscape.

ادامه مطلب