25.8.14
This website uses cookies to ensure you get the best experience on our website. Learn more

Initial Access Operations

"Red team classes cover a typical range of topics such as reconnaissance, initial access, post-exploitation, and more. However, the sheer volume of material covered in each of these steps really stymies a student's ability to take a deep dive on any individual topic. We're changing that narrative with a course fully dedicated to Initial Access Operations. Initial Access Operations is designed to immerse you in multiple techniques that attackers (and red teams) use to gain initial access into a targeted environment. We'll look at credential harvesting techniques attackers commonly use when enticing victims to authenticate into a malicious (web) application. We'll also review the most effective methods of weaponizing office documents, which are still widely employed by attackers and red teams due to high success rates. Additionally, we'll learn about browser-based attacks, which can provide unique opportunities for attackers to remain largely in memory. Finally, we'll discuss different ways to protect malicious code by only allowing it to run on the specific system(s) you are targeting. By the end of this course, you will be proficient in employing various methods of compromising targets as well building your own malware."

Skills / Knowledge

  • Pentesting
  • Malware

Issued on

August 3, 2021

Expires on

Does not expire