Offensive IOT Exploitation

Offensive IOT Exploitation
English | Tutorial | Size: 2.49 GB


COURSE ABSTRACT
IoT or the Internet of Things is one of the most upcoming trends in technology as of now. A lot many new devices are coming up every single month. However, not much attention has been paid to the device’s security till now.

BlackHillsInfoSec – Windows Post Exploitation BootCamp

BlackHillsInfoSec – Windows Post Exploitation BootCamp
English | Tutorial | Size: 3.72 GB


Kyle Avery started with Black Hills Information Security (BHIS) as an intern in October 2020 and was hired on as a full-time Penetration Tester in December 2020.

Pluralsight – Assessing Red Team Post Exploitation Activity

Pluralsight – Assessing Red Team Post Exploitation Activity
English | Tutorial | Size: 304.91 MB


In this course, you will explore the mindset and techniques used by red team operators and common cyber adversaries, and the ways the defensive teams can detect and even get ahead of these malicious actions.

Pluralsight – Post Exploitation with PowerShell

Pluralsight – Post Exploitation with PowerShell
English | Tutorial | Size: 241.77 MB


After gaining access to a server in a red team engagement, your next step is to escalate your privileges and establish persistence. This course will teach you post-exploitation techniques with PowerShell.