Login: Password:  Do not remember me

Categories




Video TrainingWindows API Exploitation Recipes Processes, Tokens and Memory RW



Windows API Exploitation Recipes Processes, Tokens and Memory RW

Windows API Exploitation Recipes Processes, Tokens and Memory RW
English | Size: 2.11 GB
Category: CBTs

In today's secured environments, it is almost impossible for Red-Blue Teams to emulate modern adversarial tactics, techniques and procedures using publicly available 3rd party pentesting products. Powerful adversaries typically develop custom code to ensure stealth and undetectability for as long as possible. This course uses a recipe approach to teach Red-Blue teams to do exactly this. In this module, we will specifically look at different techniques to query Process Listing using a variety of Windows APIs. We will also go in-depth into Windows Tokens, different fields and how to get this programmatically. Finally, we will understand how to read-write process memory.

      Read more...         

Video TrainingWindows API Exploitation Recipes Processes, Tokens and Memory RW Course Videos



Windows API Exploitation Recipes Processes, Tokens and Memory RW Course Videos

Windows API Exploitation Recipes Processes, Tokens and Memory RW Course Videos
English | Size: 2.1 GB
Category: CBTs

In today's secured environments, it is almost impossible for Red-Blue Teams to emulate modern adversarial tactics, techniques and procedures using publicly available 3rd party pentesting products. Powerful adversaries typically develop custom code to ensure stealth and undetectability for as long as possible. This course uses a recipe approach to teach Red-Blue teams to do exactly this. In this module, we will specifically look at different techniques to query Process Listing using a variety of Windows APIs. We will also go in-depth into Windows Tokens, different fields and how to get this programmatically. Finally, we will understand how to read-write process memory.

      Read more...         

Video TrainingOffensive Security Advanced Windows Exploitation 2 0



Offensive Security Advanced Windows Exploitation 2 0
Offensive-Security-Advanced Windows Exploitation 2 0
English | Size: 377.83 MB
Category: CBTs

Module 01 - Egghunters
Module 02 - Bypassing NX (update : bypassing DEP)
Module 03 - Custom Shellcode Creation
Module 04 - Venetian Shellcode
Module 05 - Kernel Drivers Exploitation

      Read more...         

Video TrainingPost Exploitation Hacking – Persistence and Continued Access



Post Exploitation Hacking – Persistence and Continued Access
Post Exploitation Hacking – Persistence and Continued Access
English | Size: 1.33 GB
Category: Video Training

In this free self-paced online training course, you’ll cover three main topics: Information Gathering, Backdooring and Covering Steps, how to use system specific tools to get general information, listener shells, metasploit and meterpreter scripting.

      Read more...         

Search



Updates


«    April 2019    »
MonTueWedThuFriSatSun
1234567
891011121314
15161718192021
22232425262728
2930 


Friend Sites


» ReleaseLog
» Gfxtorrent

Your Link Here ?
(Pagerank 4 or above)