PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links:







Partners
warezload

movieblogarea download
katzdownload

Ethical HackingComplete RED TEAM OPERATIONS in Practical

Category: Courses / Others
Author: AD-TEAM
Date added: 06.09.2023 :08:58
Views: 13
Comments: 0










Description material

Ethical HackingComplete RED TEAM OPERATIONS in Practical


Ethical HackingComplete RED TEAM OPERATIONS in Practical
Language: English | Size:6.58 GB
Genre:eLearning


Files Included :

1 Introduction to the course.mp4 (94.84 MB)
MP4
2 Disclaimer.mp4 (9.34 MB)
MP4
1 Exploration of Cobalt Strike and Reversing Encoded Compressed Obfuscated Script.mp4 (162.04 MB)
MP4
2 Payload Delivery Utilizing bitsadmin exe.mp4 (27.51 MB)
MP4
3 Elimination of Indicators - Time Stomping Attack.mp4 (63.03 MB)
MP4
4 Execution through Command and Scripting Interpreter.mp4 (46.17 MB)
MP4
1 Adding a Cobalt Strike Payload in the Run Key Registry.mp4 (42.61 MB)
MP4
2 Placing the Payload in the Start-up Folder.mp4 (41.11 MB)
MP4
3 Adopting a Threat Actor's Perspective for Scheduled Task Placement.mp4 (73.48 MB)
MP4
4 Create an account to maintain access.mp4 (52.12 MB)
MP4
5 Manipulate user accounts to maintain access.mp4 (55.81 MB)
MP4
6 Enable and Disable the account.mp4 (39.36 MB)
MP4
1 UAC Bypass and Elevate from Medium to High Integrity.mp4 (151.5 MB)
MP4
2 Utilizing the LUA Registry Key for UAC Deactivation.mp4 (57.45 MB)
MP4
3 UAC token Duplication Attack.mp4 (85.57 MB)
MP4
4 Comprehensive Exploration of Windows Named Pipes.mp4 (47.55 MB)
MP4
5 Named Pipe Impersonation Attack.mp4 (61.03 MB)
MP4
6 Elevate Privilege through Service Control Manager.mp4 (150.08 MB)
MP4
7 Exploiting vulnerabilities to elevate the Privilege.mp4 (66.36 MB)
MP4
8 Unquoted Service Paths misconfiguration.mp4 (131.43 MB)
MP4
9 Hunting password files in a target machine.mp4 (91.49 MB)
MP4
1 What is LSASS exe.mp4 (38.17 MB)
MP4
2 Obtaining credentials via the WDigest protocol.mp4 (70.72 MB)
MP4
3 Extracting data from lsass exe process and retrieving confidential information.mp4 (99.84 MB)
MP4
4 Diverse Approaches for Extracting Data from the lsass exe Process.mp4 (101.44 MB)
MP4
5 NTLM Password cracking.mp4 (78.31 MB)
MP4
6 Stealing Browser login data's.mp4 (38.38 MB)
MP4
7 Credential Access through SAM and SYSTEM Hives.mp4 (75.56 MB)
MP4
1 RDP enable Via Registry.mp4 (44.54 MB)
MP4
2 Modify System firewall to enable the RDP Connections.mp4 (25.24 MB)
MP4
3 Laterally Move Through Impacket.mp4 (118.14 MB)
MP4
4 Investigation and IR plan for a lateral movement.mp4 (37.65 MB)
MP4
1 Exfiltrating Confidential Information.mp4 (85.98 MB)
MP4
2 Exfiltration through third party Application.mp4 (40.87 MB)
MP4
3 The Stealbit Exfiltration Tool.mp4 (24.89 MB)
MP4
1 Deleting Shadow copies from the Machine.mp4 (85 MB)
MP4
2 Modify Boot Status policies.mp4 (42 MB)
MP4
3 Deleting Event Logs from the target Machine.mp4 (22.16 MB)
MP4
4 Executing Ransomware Binary to the Target Machine.mp4 (76.6 MB)
MP4
5 IR plan for a Ransomware Attack.mp4 (60.05 MB)
MP4
1 Investigating 4624 and 4625 Events.mp4 (119.11 MB)
MP4
2 Investigating 7045 and 7034 Events.mp4 (43.94 MB)
MP4
3 Investigating Scheduled task creation Events.mp4 (16.81 MB)
MP4
4 Investigating SMB and RDP Activity.mp4 (24.33 MB)
MP4
5 Investigating SRUM Data.mp4 (67.32 MB)
MP4
6 Investigating Browser History.mp4 (35.55 MB)
MP4
1 Akira Ransomware.mp4 (87.03 MB)
MP4
2 Ryuk Ransomware.mp4 (68.28 MB)
MP4
3 Lockbit Ransomware.mp4 (61.35 MB)
MP4
1 Red + Blue Teamers - Course Conclusion.mp4 (42.3 MB)
MP4
1 What Is LOLBin.mp4 (11.81 MB)
MP4
10 Abusing WMIC exe.mp4 (44.76 MB)
MP4
11 Abusing Rclone and Vssadmin.mp4 (50.36 MB)
MP4
12 Attack flow using LOLBin.mp4 (33.45 MB)
MP4
2 Abusing Rundll32 exe.mp4 (37.12 MB)
MP4
3 Abusing Certutil exe.mp4 (44.83 MB)
MP4
4 Abusing BITSAdmin exe.mp4 (73.84 MB)
MP4
5 Abusing Conhost exe.mp4 (39.42 MB)
MP4
6 Abusing MSHTA exe.mp4 (48.31 MB)
MP4
7 Abusing Reg exe.mp4 (60.02 MB)
MP4
8 Abusing Wscript exe.mp4 (26.97 MB)
MP4
9 Abusing PowerShell exe.mp4 (26.61 MB)
MP4
1 Overview about Process and Threads.mp4 (71.18 MB)
MP4
2 Overview about DLL's and API's.mp4 (101.99 MB)
MP4
3 Process Creation Step by Step.mp4 (50.72 MB)
MP4
4 Process chain for Malware's.mp4 (33.05 MB)
MP4
1 MITRE ATT&CK framework and its Origin.mp4 (647.98 MB)
MP4
1 Comprehensive exploration of OSINT for Red and Blue Teamers.mp4 (333.87 MB)
MP4
1 Persistence – Registry Run Keys.mp4 (100.92 MB)
MP4
2 Persistence – Startup Folder.mp4 (44.46 MB)
MP4
3 Persistence – Windows Management Instrumentation (WMI).mp4 (105.98 MB)
MP4
4 Persistence – Scheduled tasks.mp4 (81.64 MB)
MP4
5 Persistence - Services.mp4 (76.33 MB)
MP4
1 Exploring research on static, dynamic, and heuristic engines.mp4 (186.47 MB)
MP4
2 Process Injection Dll Injection Process Hollowing attacks.mp4 (97.41 MB)
MP4
3 DLL Hijacking.mp4 (139.26 MB)
MP4
4 Refining the obfuscation technique through the method of renaming.mp4 (45.88 MB)
MP4
5 Control flow Obfuscation.mp4 (17.37 MB)
MP4
6 Hooking and Unhooking.mp4 (110.98 MB)
MP4
7 Understanding AMSI Overview and Methods to Bypass.mp4 (120.65 MB)
MP4
1 Developing Shellcode for Process Injection Techniques.mp4 (34.65 MB)
MP4
2 Process Injection Code Overview.mp4 (40.12 MB)
MP4
3 Gaining Initial Access via Process Injection Techniques.mp4 (52.13 MB)
MP4
4 Investigating Reverse Connection.mp4 (25.72 MB)
MP4
5 Leveraging External Remote Services for Initial Access.mp4 (58.02 MB)
MP4
6 Gaining Initial Access via Phishing Tactics.mp4 (25.08 MB)
MP4
7 Leveraging Public-Facing Applications for Initial Access.mp4 (91.35 MB)
MP4
8 Utilizing Supply Chain Attacks for Initial Access.mp4 (19.12 MB)
MP4
1 Disabling Windows Defender Protection.mp4 (123.49 MB)
MP4
2 Configuring Exclusions in Windows Defender.mp4 (41.42 MB)
MP4
3 Bypassing Windows Defender and EDR with an Anti-Rootkit Tool.mp4 (63.41 MB)
MP4
4 Using DISM to Deactivate Windows Defender.mp4 (22.14 MB)
MP4








Join to our telegram Group
Information
Users of Guests are not allowed to comment this publication.
Choose Site Language
Keep downtopc Online Please

PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links: