Navigation X

Bookmark Mirror Link https://leakforum.st (May 16) x

https://leakforum.io/images/care/like.gif https://leakforum.io/images/care/like.gif

Sektor7 - Windows Persistence Course

posted by Sauron and Last Post: 2 days ago


Sektor7 - Windows Persistence Course  829
Sauron Retired
3,013
Posts
2,938
Threads
Retired
#1
[Image: Screenshot-2.png]

Welcome to Persistence in Windows course!
Real threat actors utilize various Tactics, Techniques and Procedures (aka TTPs). One of the tactic is Persistence - a way to survive a breached machine restart and preserve access to a target environment. There is a lot of focus on what methods adversaries use to exploit a particular vulnerability or how their C2 channels and infrastructure look like. Less often you find discussions about persistence. This course is aiming to change that.

You will learn almost 30 different persistence techniques working on Windows 10. Most of them were used by nation-state threat actors, like EquationGroup, Turla, APT29, ProjectSauron or malware, including Flame or Stuxnet.

As usual you will get not only full explanation of each technique with examples, but also a working code templates (written in C) and a complete development environment you can experiment with.
COURSE IN A NUTSHELL
You Will Learn
Knowledge about Windows persistence used by real threat actors, including nation-state adversaries
27 different techniques, including:
DLL Proxying
COM hijacking
Multiaction Tasks
Port Monitors
Time Providers
WMI Eventing
LSA-as-a-Persistence
and much more...

Target Audience
Ethical Hackers
Penetration Testers
Blue Teamers
Threat Hunters
All security engineers/professionals wanting to learn advanced offensive tactics

Requirements
Understanding of operating system architecture
Some experience with Windows OS
Basic knowledge about coding in C/C++
Computer with min. 4 GB of RAM + 30 GB of free disk space
VirtualBox 6.0+ installed
Strong will to learn and having fun


Hidden Content
You must register or login to view this content.

Yaya Until Further Notice I Am Retired Yaya
  Reply
del1ja500 Member
71
Posts
0
Threads
Member
#2
Thanks for the resource, you are the king!
Reply
xali1996 Member
13
Posts
0
Threads
Member
#3
Appreicate it
Reply
darhud2002 Junior Member
5
Posts
0
Threads
Junior Member
#4
(5 months ago)Sauron Wrote:
[Image: Screenshot-2.png]

Welcome to Persistence in Windows course!
Real threat actors utilize various Tactics, Techniques and Procedures (aka TTPs). One of the tactic is Persistence - a way to survive a breached machine restart and preserve access to a target environment. There is a lot of focus on what methods adversaries use to exploit a particular vulnerability or how their C2 channels and infrastructure look like. Less often you find discussions about persistence. This course is aiming to change that.

You will learn almost 30 different persistence techniques working on Windows 10. Most of them were used by nation-state threat actors, like EquationGroup, Turla, APT29, ProjectSauron or malware, including Flame or Stuxnet.

As usual you will get not only full explanation of each technique with examples, but also a working code templates (written in C) and a complete development environment you can experiment with.
COURSE IN A NUTSHELL
You Will Learn
Knowledge about Windows persistence used by real threat actors, including nation-state adversaries
27 different techniques, including:
DLL Proxying
COM hijacking
Multiaction Tasks
Port Monitors
Time Providers
WMI Eventing
LSA-as-a-Persistence
and much more...

Target Audience
Ethical Hackers
Penetration Testers
Blue Teamers
Threat Hunters
All security engineers/professionals wanting to learn advanced offensive tactics

Requirements
Understanding of operating system architecture
Some experience with Windows OS
Basic knowledge about coding in C/C++
Computer with min. 4 GB of RAM + 30 GB of free disk space
VirtualBox 6.0+ installed
Strong will to learn and having fun
thank you
Reply
dielianhua Member
24
Posts
0
Threads
Member
#5
thanks very much for you
Reply
UnknownRat Junior Member
8
Posts
1
Threads
Junior Member
#6
i cant wait to persist
Reply
Palimos Junior Member
7
Posts
0
Threads
Junior Member
#7
Thank you thank you
Reply
Mokoko75 Member
17
Posts
0
Threads
Member
#8
(5 months ago)Sauron Wrote:
[Image: Screenshot-2.png]

Welcome to Persistence in Windows course!
Real threat actors utilize various Tactics, Techniques and Procedures (aka TTPs). One of the tactic is Persistence - a way to survive a breached machine restart and preserve access to a target environment. There is a lot of focus on what methods adversaries use to exploit a particular vulnerability or how their C2 channels and infrastructure look like. Less often you find discussions about persistence. This course is aiming to change that.

You will learn almost 30 different persistence techniques working on Windows 10. Most of them were used by nation-state threat actors, like EquationGroup, Turla, APT29, ProjectSauron or malware, including Flame or Stuxnet.

As usual you will get not only full explanation of each technique with examples, but also a working code templates (written in C) and a complete development environment you can experiment with.
COURSE IN A NUTSHELL
You Will Learn
Knowledge about Windows persistence used by real threat actors, including nation-state adversaries
27 different techniques, including:
DLL Proxying
COM hijacking
Multiaction Tasks
Port Monitors
Time Providers
WMI Eventing
LSA-as-a-Persistence
and much more...

Target Audience
Ethical Hackers
Penetration Testers
Blue Teamers
Threat Hunters
All security engineers/professionals wanting to learn advanced offensive tactics

Requirements
Understanding of operating system architecture
Some experience with Windows OS
Basic knowledge about coding in C/C++
Computer with min. 4 GB of RAM + 30 GB of free disk space
VirtualBox 6.0+ installed
Strong will to learn and having fun

Thank you very much for this leaked resources !!
Reply
newuser Junior Member
4
Posts
0
Threads
Junior Member
#9
(1 month ago)Palimos Wrote: Thank you thank you

Reply

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Users browsing this thread: 1 Guest(s)