Description
Size: 20.4 GB
WHO SHOULD TAKE THIS COURSE
- Aspiring red teamers
- Penetration testers
- Defenders / Blue teamers
- Information security students
- Anyone interested in learning fundamental attacks commonly used to get a foothold during red team exercises
KEY TAKEAWAYS
- Students will learn OPSEC considerations when performing each step from reconnaissance to initial foothold.
- Students will learn how to counter modern defenses that can interfere with each attack.
- Students will learn how to set up an environment for testing each attack before running it against targets.
- Students will get hands-on practice:
- Performing reconnaissance to support each attack.
- Setting up their own “botnet” with ProxyCannon to spread traffic across multiple source IP addresses.
- Executing password guessing attacks such as credential stuffing and password spraying.
- Phishing for credentials and sessions to bypass multi-factor authentication.
- Setting up and using Azure Information Protection (AIP) to deliver encrypted phishing emails.
- Creating “MalDocs”—Microsoft Office documents with embedded executable payloads.
- Delivering executable payloads during a phishing campaign.