Navigation X

[Big Banner Ad Space Available]
[Big Banner Ad Space Available]

Sektor7 - Windows Persistence Course

posted by Sauron and Last Post: 8 months ago


Sektor7 - Windows Persistence Course  2971
Sauron Moderator
3.684
Posts
3.561
Threads
Moderator
[This post was last modified: 8 months ago by Leviathan ]
#1
[Image: Screenshot-2.png]

Welcome to Persistence in Windows course!
Real threat actors utilize various Tactics, Techniques and Procedures (aka TTPs). One of the tactic is Persistence - a way to survive a breached machine restart and preserve access to a target environment. There is a lot of focus on what methods adversaries use to exploit a particular vulnerability or how their C2 channels and infrastructure look like. Less often you find discussions about persistence. This course is aiming to change that.

You will learn almost 30 different persistence techniques working on Windows 10. Most of them were used by nation-state threat actors, like EquationGroup, Turla, APT29, ProjectSauron or malware, including Flame or Stuxnet.

As usual you will get not only full explanation of each technique with examples, but also a working code templates (written in C) and a complete development environment you can experiment with.
COURSE IN A NUTSHELL
You Will Learn
Knowledge about Windows persistence used by real threat actors, including nation-state adversaries
27 different techniques, including:
DLL Proxying
COM hijacking
Multiaction Tasks
Port Monitors
Time Providers
WMI Eventing
LSA-as-a-Persistence
and much more...

Target Audience
Ethical Hackers
Penetration Testers
Blue Teamers
Threat Hunters
All security engineers/professionals wanting to learn advanced offensive tactics

Requirements
Understanding of operating system architecture
Some experience with Windows OS
Basic knowledge about coding in C/C++
Computer with min. 4 GB of RAM + 30 GB of free disk space
VirtualBox 6.0+ installed
Strong will to learn and having fun


Hidden Content
You must register or login to view this content.

 Password:  LeakForum.io
Contact other staff members for help im no longer as active!
 
del1ja500 Member
91
Posts
0
Threads
Member
#2
Thanks for the resource, you are the king!
xali1996 Member
25
Posts
0
Threads
Member
#3
Appreicate it
darhud2002 Junior Member
5
Posts
0
Threads
Junior Member
#4
(1 year ago)Sauron Wrote:
[Image: Screenshot-2.png]

Welcome to Persistence in Windows course!
Real threat actors utilize various Tactics, Techniques and Procedures (aka TTPs). One of the tactic is Persistence - a way to survive a breached machine restart and preserve access to a target environment. There is a lot of focus on what methods adversaries use to exploit a particular vulnerability or how their C2 channels and infrastructure look like. Less often you find discussions about persistence. This course is aiming to change that.

You will learn almost 30 different persistence techniques working on Windows 10. Most of them were used by nation-state threat actors, like EquationGroup, Turla, APT29, ProjectSauron or malware, including Flame or Stuxnet.

As usual you will get not only full explanation of each technique with examples, but also a working code templates (written in C) and a complete development environment you can experiment with.
COURSE IN A NUTSHELL
You Will Learn
Knowledge about Windows persistence used by real threat actors, including nation-state adversaries
27 different techniques, including:
DLL Proxying
COM hijacking
Multiaction Tasks
Port Monitors
Time Providers
WMI Eventing
LSA-as-a-Persistence
and much more...

Target Audience
Ethical Hackers
Penetration Testers
Blue Teamers
Threat Hunters
All security engineers/professionals wanting to learn advanced offensive tactics

Requirements
Understanding of operating system architecture
Some experience with Windows OS
Basic knowledge about coding in C/C++
Computer with min. 4 GB of RAM + 30 GB of free disk space
VirtualBox 6.0+ installed
Strong will to learn and having fun
thank you
dielianhua Member
24
Posts
0
Threads
Member
#5
thanks very much for you
UnknownRat Junior Member
8
Posts
1
Threads
Junior Member
#6
i cant wait to persist
Palimos Junior Member
7
Posts
0
Threads
Junior Member
#7
Thank you thank you
Mokoko75 Member
20
Posts
0
Threads
Member
#8
(1 year ago)Sauron Wrote:
[Image: Screenshot-2.png]

Welcome to Persistence in Windows course!
Real threat actors utilize various Tactics, Techniques and Procedures (aka TTPs). One of the tactic is Persistence - a way to survive a breached machine restart and preserve access to a target environment. There is a lot of focus on what methods adversaries use to exploit a particular vulnerability or how their C2 channels and infrastructure look like. Less often you find discussions about persistence. This course is aiming to change that.

You will learn almost 30 different persistence techniques working on Windows 10. Most of them were used by nation-state threat actors, like EquationGroup, Turla, APT29, ProjectSauron or malware, including Flame or Stuxnet.

As usual you will get not only full explanation of each technique with examples, but also a working code templates (written in C) and a complete development environment you can experiment with.
COURSE IN A NUTSHELL
You Will Learn
Knowledge about Windows persistence used by real threat actors, including nation-state adversaries
27 different techniques, including:
DLL Proxying
COM hijacking
Multiaction Tasks
Port Monitors
Time Providers
WMI Eventing
LSA-as-a-Persistence
and much more...

Target Audience
Ethical Hackers
Penetration Testers
Blue Teamers
Threat Hunters
All security engineers/professionals wanting to learn advanced offensive tactics

Requirements
Understanding of operating system architecture
Some experience with Windows OS
Basic knowledge about coding in C/C++
Computer with min. 4 GB of RAM + 30 GB of free disk space
VirtualBox 6.0+ installed
Strong will to learn and having fun

Thank you very much for this leaked resources !!
newuser Junior Member
4
Posts
0
Threads
Junior Member
#9
(10 months ago)Palimos Wrote: Thank you thank you

Mosa1 Junior Member
5
Posts
0
Threads
Junior Member
#10
thanks man


Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Users browsing this thread: 1 Guest(s)