Section 5.zip
271.5 MB
1 - RFID
2 - Low frequency RFID attacks
3 - Exploiting RFID contactless smart cards
4 - NFC
2 - Low frequency RFID attacks
3 - Exploiting RFID contactless smart cards
4 - NFC
1. Introduction and Planning of Red Team Exercises.zip
264.9 MB
1. About the Course
2. Defining Terms
3. Motivation and Introduction
4. Frameworks and Methodologies
5. Threat Intelligence
6. Planning
7. Roles and Responsibilities
8. Rules of Engagement
9. Attack Infrastructure
10. Exercise Execution
11. Reconnaissance
12. Social Engineering
13. Weaponization
14. Delivery
2. Defining Terms
3. Motivation and Introduction
4. Frameworks and Methodologies
5. Threat Intelligence
6. Planning
7. Roles and Responsibilities
8. Rules of Engagement
9. Attack Infrastructure
10. Exercise Execution
11. Reconnaissance
12. Social Engineering
13. Weaponization
14. Delivery
2. Red Team Exercise Execution and Closure.zip
221 MB
1. Initial Access
2. Network Propagation
3. Discovery
4. Privilege Escalation
5. Persistence
6. Defense Evasion and Execution
7. Credential Access
8. Lateral Movement and Pivoting
9. Action on Objectives
10. Target Manipulation Collection and Exfiltration
11. Exercise Closure
12. Analysis and Response
13. Reporting
14. Remediation and Action Plan
2. Network Propagation
3. Discovery
4. Privilege Escalation
5. Persistence
6. Defense Evasion and Execution
7. Credential Access
8. Lateral Movement and Pivoting
9. Action on Objectives
10. Target Manipulation Collection and Exfiltration
11. Exercise Closure
12. Analysis and Response
13. Reporting
14. Remediation and Action Plan
7. И снова разбор малвари. Связь с С2 с помощью API: WinSock2, WinINet, COM (CoCreateInstance( ), CoInitialize( ), ...), WinSock Kernel и библиотеки NDIS.
#malware #re #malw_in_asm
#malware #re #malw_in_asm