Forwarded from Cyber Detective
OSWE, OSEP, OSED and OSEE Offec's certifications complete study guides (Study Materials + Labs + Reviews):.
https://github.com/CyberSecurityUP/OSCE3-Complete-Guide
https://github.com/CyberSecurityUP/OSCE3-Complete-Guide
π3
Forwarded from Red Team Village
Forwarded from Red Team Village
Maltrak | Course: In-Depth Red Teaming: APT Adversary Simulation
Info : https://access.maltrak.com/courses/in-depth-red-teaming-apt-adversary-simulation
@RedTeamVillageRTV
Info : https://access.maltrak.com/courses/in-depth-red-teaming-apt-adversary-simulation
@RedTeamVillageRTV
π₯1
Red Team Village
Maltrak | Course: In-Depth Red Teaming: APT Adversary Simulation Info : https://access.maltrak.com/courses/in-depth-red-teaming-apt-adversary-simulation @RedTeamVillageRTV
MODULE 00: Welcome & Introduction
MODULE 01: APT Attacks & Red Team Infrastructure on AWS
MODULE 02: Phishing & Social Engineering Mastery
MODULE 03: Initial Access: Get Your Foot into the Organization Network
MODULE 04: Write Your Own HTTP Malware
MODULE 05: Implement a Plugin Framework in Your Malware with Keylogger Plugin
MODULE 06: Maintaining Persistence In-Depth (Advanced Techniques)
MODULE 07: Rooting: Privilege Escalation Techniques
MODULE 08: Malware Obfuscation: Bypass File Signature Scanning
MODULE 09: Network Obfuscation: Bypass IDS, IPS, NDR, and Machine Learning-Based Tools
MODULE 10: Bypass EDRs & Behavioral-Based Detection
MODULE 11: Impersonating Users: Credential Theft & Token Impersonation
MODULE 12: Hack the Domain Controller Through Lateral Movements
MODULE 01: APT Attacks & Red Team Infrastructure on AWS
MODULE 02: Phishing & Social Engineering Mastery
MODULE 03: Initial Access: Get Your Foot into the Organization Network
MODULE 04: Write Your Own HTTP Malware
MODULE 05: Implement a Plugin Framework in Your Malware with Keylogger Plugin
MODULE 06: Maintaining Persistence In-Depth (Advanced Techniques)
MODULE 07: Rooting: Privilege Escalation Techniques
MODULE 08: Malware Obfuscation: Bypass File Signature Scanning
MODULE 09: Network Obfuscation: Bypass IDS, IPS, NDR, and Machine Learning-Based Tools
MODULE 10: Bypass EDRs & Behavioral-Based Detection
MODULE 11: Impersonating Users: Credential Theft & Token Impersonation
MODULE 12: Hack the Domain Controller Through Lateral Movements
π2
β‘ CS 390R: Reverse Engineering and Vulnerability Analysis Free Course
https://pwn.umasscybersec.org/lectures/index.html#
https://pwn.umasscybersec.org/lectures/index.html#
π1
Hiding Linux Processes with Bind Mounts
https://dfir.ch/posts/slash-proc/
https://righteousit.com/2024/07/24/hiding-linux-processes-with-bind-mounts/
https://dfir.ch/posts/slash-proc/
https://righteousit.com/2024/07/24/hiding-linux-processes-with-bind-mounts/
Linux Hardening Guide.
β’ Choosing the right Linux distribution;
β’ Kernel hardening;
β’ Mandatory access control;
β’ Sandboxing;
β’ Hardened memory allocator;
β’ Hardened compilation flags;
β’ Memory safe languages;
β’ The root account;
β’ Firewalls;
β’ Identifiers;
β’ File permissions;
β’ Core dumps;
β’ Swap;
β’ PAM;
β’ Microcode updates;
β’ IPv6 privacy extensions;
β’ Partitioning and mount options;
β’ Entropy;
β’ Editing files as root;
β’ Distribution-specific hardening;
β’ Physical security;
β’ Best practices.
https://madaidans-insecurities.github.io
#Linux
β’ Choosing the right Linux distribution;
β’ Kernel hardening;
β’ Mandatory access control;
β’ Sandboxing;
β’ Hardened memory allocator;
β’ Hardened compilation flags;
β’ Memory safe languages;
β’ The root account;
β’ Firewalls;
β’ Identifiers;
β’ File permissions;
β’ Core dumps;
β’ Swap;
β’ PAM;
β’ Microcode updates;
β’ IPv6 privacy extensions;
β’ Partitioning and mount options;
β’ Entropy;
β’ Editing files as root;
β’ Distribution-specific hardening;
β’ Physical security;
β’ Best practices.
https://madaidans-insecurities.github.io
#Linux
β€1π1π1
Malware Development - Evading Diaries.
β’ NTFS Files Attributes;
β’ FuncIn;
β’ Code Cave;
β’ Stolen Certificate;
β’ Redirect Antivirus Website Evading Techniques;
β’ Shortcut Hiding;
β’ Disabling Antivirus;
β’ Adding Antivirus Exception;
β’ Fake Signature;
β’ Mark-Of-The-Web (MOTW) Bypass;
β’ Return Address Spoofing;
β’ Runtime Function Decryption;
β’ DLL Unhooking;
- How DLL Unhooking Works;
- Unhooking Strategies;
β’ Evasion Using Direct Syscalls;
- Key Aspects of This Technique;
- Operational Mechanism;
- Featured Windows APIs;
β’ Unloading Module With FreeLibrary;
- Operational Overview;
- Key Aspects of This Technique;
- Featured Windows APIs;
β’ References.
#Malware
β’ NTFS Files Attributes;
β’ FuncIn;
β’ Code Cave;
β’ Stolen Certificate;
β’ Redirect Antivirus Website Evading Techniques;
β’ Shortcut Hiding;
β’ Disabling Antivirus;
β’ Adding Antivirus Exception;
β’ Fake Signature;
β’ Mark-Of-The-Web (MOTW) Bypass;
β’ Return Address Spoofing;
β’ Runtime Function Decryption;
β’ DLL Unhooking;
- How DLL Unhooking Works;
- Unhooking Strategies;
β’ Evasion Using Direct Syscalls;
- Key Aspects of This Technique;
- Operational Mechanism;
- Featured Windows APIs;
β’ Unloading Module With FreeLibrary;
- Operational Overview;
- Key Aspects of This Technique;
- Featured Windows APIs;
β’ References.
#Malware
ExpiredDomains.com
redteamrecipe.com is for sale! Check it out on ExpiredDomains.com
Buy redteamrecipe.com for 195 on GoDaddy via ExpiredDomains.com. This premium expired .com domain is ideal for establishing a strong online identity.
π1
