Adversary Emulation Yaksas
English | Tutorial | Size: 1.6 GB
Learn how to perform adversary emulation exercises end-to-end
In this course, you will look at an organization’s security from a real-world adversary perspective. You are hired by a FinTech startup, Tax First Labz to conduct an adversary emulation exercise and steal their customer data (before an actual adversary). This exercise will assume zero knowledge about the target network.
During this adversary emulation exercise you mimic a real world cyber attack with a specific objective, stealing Tax Fist Labzcustomer data. You will follow the Red Team Operations Attack Lifecycle to conduct this exercise. You will go through each phase in a step-by-step manner and build our attack path as you move ahead. You will employee a variety of techniques, such as
Active and passive information gathering
Weaponizing an exploit
Internal reconnaissance
Brute-forcing via custom username and password lists
Spear phishing a senior employee
Privilege Escalation (Linux and Windows)
Automated Active Directory domain enumeration
Persistence via command and control center
Active Directory attacks
to achieve your objective. Upon completion of the exercise, you will prepare and submit a report to the organization’s management.
Through this course you will learn how to use tools such as, PoshC2, Mentalist, BloodHound, Mimikatz, Metasploit, PowerUp, icacls, PowerShell etc.
This is a beginner friendly course. If you have just started your career in offensive cybersecurity or are preparing for penetration testing exams (OSCP, eJPT, eCPT, eCPTx, CRTP etc.) then this course is for you. If you are already a penetration tester or a red teamer, you will enjoy following a live adversary emulation exercise from scope creation to reporting.
What you’ll learn
How to plan and manage adversary emulation exercise
Difference between red teaming and adversary emulation
MITRE ATT&CK Framework
Red team operations attack lifecycle
How to conduct adversary emulation exercise on a real-world organization
Open Source Intelligence (OSINT) techniques to gather information
Weaponizing exploits to gain foothold into the network
Password brute-forcing using custom username and password lists
Spear phishing a senior employee
Escalating Privileges on Linux and Windows systems
Active Directory enumeration using BloodHound
Active Directory attacks
Establishing persistence via PoshC2 (command and control center software)
Creating an engagement report
Requirements
Basic knowledge of Kali Linux
Basic knowledge of PowerShell
Basic understanding of penetration testing and red teaming
Red Teamer mindset
Who this course is for
OSCP, eCPPT, eCPTX, CRTE aspirants
Penetration testers, red teamers, offensive cyber security professionals
Professionals seeking a deeper understanding of real-world cyber attacks
Executives seeking to understand how an organization can be breached
RAPIDGATOR
rapidgator.net/file/790ff873ddc259f09f5052daba9ae89b/Adversary_Emulation_Yaksas.part1.rar.html
rapidgator.net/file/5c1dbb7e72e585bbe2c2ae5191cbb170/Adversary_Emulation_Yaksas.part2.rar.html
rapidgator.net/file/98fb3790c54fd6ffdc8a8886e5cbbf6c/Adversary_Emulation_Yaksas.part3.rar.html
NITROFLARE
nitroflare.com/view/201DFA3B9E44F5A/Adversary_Emulation_Yaksas.part1.rar
nitroflare.com/view/A00F3F1FCE3A462/Adversary_Emulation_Yaksas.part2.rar
nitroflare.com/view/91E2DFEACCD3493/Adversary_Emulation_Yaksas.part3.rar