LEARNING FOR LIFE

Get Yourself a Better Life! Free eLearning Download

  • Technical
    • Internet & Networking
    • Security & Hacking
    • AI | Artificial intelligence
    • OS & Server
    • WEB/HTML/CSS/AJAX
    • Database & SQL
    • Programming
    • Perl & PHP
    • .Net & Java
    • Mobile Development
    • C/C++/C#
    • Game Development
    • Unix & Linux
    • MAC OS X
    • Windows
    • OFFICE
    • Operation Systems
    • Hardware
  • Graphic & Media
    • Photography
    • 3D
    • Adobe Product Training
    • Art & Drawing & Painting
    • Film & Film Making
    • Game Designing
    • Music Training
    • Tutorials for designer
  • Business
    • Business & Investing
    • Writing & Affiliate
    • Marketing
    • Sales
    • Economics & Finances
    • Seo & Site Traffic
    • Stock & ForEX
  • Life Stype
    • Self Improvement | MP
    • Mindset | NLP
    • Fashion / Clothing / Grooming
    • Seduction
    • Fighting / Martial Arts
    • Food / Drink / Cooking
    • Health / Fitness / Massage
    • Languages / Accents
    • Magic / Illusions / Tricks
    • Psychology / Body Language
  • Engineering & Science
    • Cultures & History
    • Electrical & Architecture
    • Mathematics & Physics
    • Medical
  • Entertainment
    • Comic
    • Manga
    • Novel
    • Magazine
  • PC Game
    • Mac Game
    • Xbox Game
    • Play Station Game
Home » Ebooks & Tutorials » Technical » Security & Hacking » Initial Access Operations 2021 | FortyNorth Security

Initial Access Operations 2021 | FortyNorth Security

21/10/2021 Tut4DL Leave a Comment


Initial Access Operations 2021 | FortyNorth Security
English | Size: 3.62 GB
Genre: eLearning

One of the most critical aspects of any red team assessment is obtaining initial access into your target’s environment. The ability to capture valid credentials or execute code within your target’s environment is the first step toward accomplishing the rest of your assessment goals.

In this course, students will learn a variety of techniques used by attackers to phish companies and then write their own malware in a hands-on environment.

This class will cover a wide range of topics over a two-day period:

Development Environment Prep – We start by building multiple development environments (within virtual machines) for writing malware. We discuss the different tools, languages, and operating system configurations that our malware developers use when writing code and then set them up in our virtual machines.
Malware/Campaign Goals – When writing phishing malware, we typically have one of two goals: harvest credentials from our victim or execute arbitrary code on their workstation.
Credential Harvesting – Harvesting account credentials can be very dependent upon the type of services your target has publicly available. Is there a VPN portal, outlook web access, HR self-service portal, Citrix access? Ultimately, your goal is to entice the user to enter their credentials into a web form that securely saves their information and possibly their multi-factor token. We’ll look at both custom code and existing open source tooling which helps to accomplish this objective.
Arbitrary Code Execution – Code execution typically will result in a Meterpreter or Cobalt Strike Beacon connecting back to your command and control servers when your attack vector is executed by the targeted employee. To accomplish the code execution objective, we discuss and customize browser-based attacks that attackers use to accomplish this objective.
Code Execution Deep Dive – After looking at examples of how attackers can leverage web browsers to execute code on their target’s systems, we do a deep-dive into different methods of customizing code execution malware.
Process Injection Techniques – There are many ways that an attacker can inject code not only into its current process, but also other processes that are running on the targeted system. We discuss the pros and cons of injecting into remote processes and walk through the different API calls that enable these capabilities.
DotNetToJScript – The tool DotNetToJScript has changed how the industry writes phishing malware. It has extended the functionality of “low capability” browser-compatible languages to match that of fully functional development languages. We walk through how you can use different process injection techniques within a browser-based attack with DotNetToJScript.
Code Protection/Targeted Malware – Why spend all that time writing your own malware with the latest techniques available to let anyone arbitrarily run it and possibly write detections for it? You’re going to learn multiple techniques to not only attempt to prevent your code from running in any form of a sandbox, but also how to ensure your malware only runs on the system(s) you are targeting.
At the conclusion of the class, students will have a strong understanding of different techniques used by modern attackers in phishing attacks. Additionally, all students will have learned various methods to extend basic phishing attacks to include process injection techniques that are used to avoid detection.

https://nitro.download/view/0CF6CA03F61DE23/FortyNorth-Initial-Access-Operations-2021.part01.rar
https://nitro.download/view/4E98AE43D2009A9/FortyNorth-Initial-Access-Operations-2021.part02.rar
https://nitro.download/view/34568616D8BDF69/FortyNorth-Initial-Access-Operations-2021.part03.rar
https://nitro.download/view/01BF97C11175397/FortyNorth-Initial-Access-Operations-2021.part04.rar
https://nitro.download/view/D7C1DCE4A86EC3D/FortyNorth-Initial-Access-Operations-2021.part05.rar
https://nitro.download/view/2FBC7B0C7325F91/FortyNorth-Initial-Access-Operations-2021.part06.rar
https://nitro.download/view/69654A8CC8F4DE8/FortyNorth-Initial-Access-Operations-2021.part07.rar
https://nitro.download/view/7B6C8A2D7AF3528/FortyNorth-Initial-Access-Operations-2021.part08.rar
https://nitro.download/view/FD2951A00DD97D4/FortyNorth-Initial-Access-Operations-2021.part09.rar
https://nitro.download/view/2421C49F77C3409/FortyNorth-Initial-Access-Operations-2021.part10.rar
https://nitro.download/view/CE11CA7AFB83052/FortyNorth-Initial-Access-Operations-2021.part11.rar
https://nitro.download/view/B77BEDB17ACD8FE/FortyNorth-Initial-Access-Operations-2021.part12.rar
https://nitro.download/view/4B4B75D3770CD31/FortyNorth-Initial-Access-Operations-2021.part13.rar

https://rapidgator.net/file/25e20647f5f55791476f9f5ca5af5e5b/FortyNorth-Initial-Access-Operations-2021.part01.rar.html
https://rapidgator.net/file/889474e12af06ff476fe25def8ecf824/FortyNorth-Initial-Access-Operations-2021.part02.rar.html
https://rapidgator.net/file/98721a030b807b60ec98e56dd64fead4/FortyNorth-Initial-Access-Operations-2021.part03.rar.html
https://rapidgator.net/file/419fe009d3d188c87919f187c4b5d341/FortyNorth-Initial-Access-Operations-2021.part04.rar.html
https://rapidgator.net/file/ea06af885bcdfc0b88da2ed2eefede62/FortyNorth-Initial-Access-Operations-2021.part05.rar.html
https://rapidgator.net/file/dc3548ac6db7a2a859f4bb537d8f4599/FortyNorth-Initial-Access-Operations-2021.part06.rar.html
https://rapidgator.net/file/ea4f3f92c02125be5cc883455c7ad14e/FortyNorth-Initial-Access-Operations-2021.part07.rar.html
https://rapidgator.net/file/b93cb834164c076a3cc77c29ad3aa0ac/FortyNorth-Initial-Access-Operations-2021.part08.rar.html
https://rapidgator.net/file/2aa3e674419fb4d3261d4ec1567fa7ac/FortyNorth-Initial-Access-Operations-2021.part09.rar.html
https://rapidgator.net/file/fef14e29d1641af8c829164784d43256/FortyNorth-Initial-Access-Operations-2021.part10.rar.html
https://rapidgator.net/file/683ae67d20494ae53faaf4f17fc2387b/FortyNorth-Initial-Access-Operations-2021.part11.rar.html
https://rapidgator.net/file/d69d9168a279f61923965bc83046c97a/FortyNorth-Initial-Access-Operations-2021.part12.rar.html
https://rapidgator.net/file/878f7e797b0e5ab145dd0da776ce8ea2/FortyNorth-Initial-Access-Operations-2021.part13.rar.html

If any links die or problem unrar, send request to
https://forms.gle/e557HbjJ5vatekDV9

Security & Hacking

← BIG-IP F5 LTM Training from Beginner to Expert | Udemy Learn Kubernetes with Civo Academy →

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Network Switching For Cybersecurity – Hands-On Training | Udemy
  • Data Science Mastery: Journey into Machine Learning | Udemy
  • The Great Courses Plus – War In The Modern World
  • BBC – VE Day 70: Remembering Victory (2015)
  • BBC – Urbi et Orbi (2025)

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

2019 2020 2021 2022 2023 2024 Advanced AWS Azure BBC Beginners BitBook BOOKWARE Certified Cisco Cloud Comic Complete Course Data Design eBook Fundamentals Guide Hybrid iLEARN Introduction JavaScript Learn Learning LinkedIn Linux Lynda Masterclass Microsoft Packt Pluralsight Programming Python Security Skillshare Training Udemy Using XQZT

Copyright © 2025 · Equilibre on Genesis Framework · WordPress · Log in