Dark Vortex Offensive Tool Development
English | Tutorial | Size: 2.2 GB
ON HOLD – LIVE WORKSHOP IS BEING CONVERTED TO VIDEO COURSE WORKSHOP IS AVAILABLE ON DEMAND FOR CUSTOMERS
What To Expect
The Offensive Tool Development is the first course which is dedicated to Windows API exploitation to build your own tools for Red Team Engagements. If you have completed the Malware On Steroids course, then you can merge the capabilities you build during this course with the Command & Control built during the MOS course. This helps you to build your own CnC modules, all of which can be run in memory for detection evasion. There are a lot of courses which focus on exploitation, reversing and other offensive stuff, but none of them focus on writing your own tools and brining your own toolkit during an engagement.
This course is highly technical in nature, involving a lot of coding and all the tools will be written in either C or C++, sometimes PowerShell (maybe 5%) to make sure the user has capabilitiy to load every tool in memory and evade memory artefacts or detections. During the course, you will build your own reflective tools and shellcode for Host Enumeration, Lateral Movement, Domain Enumeration and Domain Privilege Escalation. You will learn to build different types of remote access tools running over different protocols including RPC, SMB, and HTTP and use exploit Windows Security Tokens for lateral movement within a Domain Environment.
The below figure highlights a brief overview on the focus area of the training session.
RAPIDGATOR:
rapidgator.net/file/729c704cccf9dd270d4736293dcd699d/Offensive_Tool_Development.part1.rar.html
rapidgator.net/file/92527ada2a5a90320b27b0d960fa1cd9/Offensive_Tool_Development.part2.rar.html
ALFAFILE:
alfafile.net/file/AibxF/Offensive_Tool_Development.part1.rar
alfafile.net/file/AibxL/Offensive_Tool_Development.part2.rar