Ethical HackingComplete RED TEAM OPERATIONS in Practical
Language: English | Size:6.58 GB
Genre:eLearning
Files Included :
1 Introduction to the course.mp4 (94.84 MB)
MP4
2 Disclaimer.mp4 (9.34 MB)
MP4
1 Exploration of Cobalt Strike and Reversing Encoded Compressed Obfuscated Script.mp4 (162.04 MB)
MP4
2 Payload Delivery Utilizing bitsadmin exe.mp4 (27.51 MB)
MP4
3 Elimination of Indicators - Time Stomping Attack.mp4 (63.03 MB)
MP4
4 Execution through Command and Scripting Interpreter.mp4 (46.17 MB)
MP4
1 Adding a Cobalt Strike Payload in the Run Key Registry.mp4 (42.61 MB)
MP4
2 Placing the Payload in the Start-up Folder.mp4 (41.11 MB)
MP4
3 Adopting a Threat Actor's Perspective for Scheduled Task Placement.mp4 (73.48 MB)
MP4
4 Create an account to maintain access.mp4 (52.12 MB)
MP4
5 Manipulate user accounts to maintain access.mp4 (55.81 MB)
MP4
6 Enable and Disable the account.mp4 (39.36 MB)
MP4
1 UAC Bypass and Elevate from Medium to High Integrity.mp4 (151.5 MB)
MP4
2 Utilizing the LUA Registry Key for UAC Deactivation.mp4 (57.45 MB)
MP4
3 UAC token Duplication Attack.mp4 (85.57 MB)
MP4
4 Comprehensive Exploration of Windows Named Pipes.mp4 (47.55 MB)
MP4
5 Named Pipe Impersonation Attack.mp4 (61.03 MB)
MP4
6 Elevate Privilege through Service Control Manager.mp4 (150.08 MB)
MP4
7 Exploiting vulnerabilities to elevate the Privilege.mp4 (66.36 MB)
MP4
8 Unquoted Service Paths misconfiguration.mp4 (131.43 MB)
MP4
9 Hunting password files in a target machine.mp4 (91.49 MB)
MP4
1 What is LSASS exe.mp4 (38.17 MB)
MP4
2 Obtaining credentials via the WDigest protocol.mp4 (70.72 MB)
MP4
3 Extracting data from lsass exe process and retrieving confidential information.mp4 (99.84 MB)
MP4
4 Diverse Approaches for Extracting Data from the lsass exe Process.mp4 (101.44 MB)
MP4
5 NTLM Password cracking.mp4 (78.31 MB)
MP4
6 Stealing Browser login data's.mp4 (38.38 MB)
MP4
7 Credential Access through SAM and SYSTEM Hives.mp4 (75.56 MB)
MP4
1 RDP enable Via Registry.mp4 (44.54 MB)
MP4
2 Modify System firewall to enable the RDP Connections.mp4 (25.24 MB)
MP4
3 Laterally Move Through Impacket.mp4 (118.14 MB)
MP4
4 Investigation and IR plan for a lateral movement.mp4 (37.65 MB)
MP4
1 Exfiltrating Confidential Information.mp4 (85.98 MB)
MP4
2 Exfiltration through third party Application.mp4 (40.87 MB)
MP4
3 The Stealbit Exfiltration Tool.mp4 (24.89 MB)
MP4
1 Deleting Shadow copies from the Machine.mp4 (85 MB)
MP4
2 Modify Boot Status policies.mp4 (42 MB)
MP4
3 Deleting Event Logs from the target Machine.mp4 (22.16 MB)
MP4
4 Executing Ransomware Binary to the Target Machine.mp4 (76.6 MB)
MP4
5 IR plan for a Ransomware Attack.mp4 (60.05 MB)
MP4
1 Investigating 4624 and 4625 Events.mp4 (119.11 MB)
MP4
2 Investigating 7045 and 7034 Events.mp4 (43.94 MB)
MP4
3 Investigating Scheduled task creation Events.mp4 (16.81 MB)
MP4
4 Investigating SMB and RDP Activity.mp4 (24.33 MB)
MP4
5 Investigating SRUM Data.mp4 (67.32 MB)
MP4
6 Investigating Browser History.mp4 (35.55 MB)
MP4
1 Akira Ransomware.mp4 (87.03 MB)
MP4
2 Ryuk Ransomware.mp4 (68.28 MB)
MP4
3 Lockbit Ransomware.mp4 (61.35 MB)
MP4
1 Red + Blue Teamers - Course Conclusion.mp4 (42.3 MB)
MP4
1 What Is LOLBin.mp4 (11.81 MB)
MP4
10 Abusing WMIC exe.mp4 (44.76 MB)
MP4
11 Abusing Rclone and Vssadmin.mp4 (50.36 MB)
MP4
12 Attack flow using LOLBin.mp4 (33.45 MB)
MP4
2 Abusing Rundll32 exe.mp4 (37.12 MB)
MP4
3 Abusing Certutil exe.mp4 (44.83 MB)
MP4
4 Abusing BITSAdmin exe.mp4 (73.84 MB)
MP4
5 Abusing Conhost exe.mp4 (39.42 MB)
MP4
6 Abusing MSHTA exe.mp4 (48.31 MB)
MP4
7 Abusing Reg exe.mp4 (60.02 MB)
MP4
8 Abusing Wscript exe.mp4 (26.97 MB)
MP4
9 Abusing PowerShell exe.mp4 (26.61 MB)
MP4
1 Overview about Process and Threads.mp4 (71.18 MB)
MP4
2 Overview about DLL's and API's.mp4 (101.99 MB)
MP4
3 Process Creation Step by Step.mp4 (50.72 MB)
MP4
4 Process chain for Malware's.mp4 (33.05 MB)
MP4
1 MITRE ATT&CK framework and its Origin.mp4 (647.98 MB)
MP4
1 Comprehensive exploration of OSINT for Red and Blue Teamers.mp4 (333.87 MB)
MP4
1 Persistence – Registry Run Keys.mp4 (100.92 MB)
MP4
2 Persistence – Startup Folder.mp4 (44.46 MB)
MP4
3 Persistence – Windows Management Instrumentation (WMI).mp4 (105.98 MB)
MP4
4 Persistence – Scheduled tasks.mp4 (81.64 MB)
MP4
5 Persistence - Services.mp4 (76.33 MB)
MP4
1 Exploring research on static, dynamic, and heuristic engines.mp4 (186.47 MB)
MP4
2 Process Injection Dll Injection Process Hollowing attacks.mp4 (97.41 MB)
MP4
3 DLL Hijacking.mp4 (139.26 MB)
MP4
4 Refining the obfuscation technique through the method of renaming.mp4 (45.88 MB)
MP4
5 Control flow Obfuscation.mp4 (17.37 MB)
MP4
6 Hooking and Unhooking.mp4 (110.98 MB)
MP4
7 Understanding AMSI Overview and Methods to Bypass.mp4 (120.65 MB)
MP4
1 Developing Shellcode for Process Injection Techniques.mp4 (34.65 MB)
MP4
2 Process Injection Code Overview.mp4 (40.12 MB)
MP4
3 Gaining Initial Access via Process Injection Techniques.mp4 (52.13 MB)
MP4
4 Investigating Reverse Connection.mp4 (25.72 MB)
MP4
5 Leveraging External Remote Services for Initial Access.mp4 (58.02 MB)
MP4
6 Gaining Initial Access via Phishing Tactics.mp4 (25.08 MB)
MP4
7 Leveraging Public-Facing Applications for Initial Access.mp4 (91.35 MB)
MP4
8 Utilizing Supply Chain Attacks for Initial Access.mp4 (19.12 MB)
MP4
1 Disabling Windows Defender Protection.mp4 (123.49 MB)
MP4
2 Configuring Exclusions in Windows Defender.mp4 (41.42 MB)
MP4
3 Bypassing Windows Defender and EDR with an Anti-Rootkit Tool.mp4 (63.41 MB)
MP4
4 Using DISM to Deactivate Windows Defender.mp4 (22.14 MB)
MP4