• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.
Resource icon

SentinelOne – Threat Hunting course 3GB

No permission to download

Stealth Cyber Operator [CSCO]​

  • Red Team Resource Development [Infra Setup]
  • Abuse improperly placed and mis-configured security controls in infrastructure
  • Trade-craft development for Offensive Operations
  • Resource abuse using Windows APIs, C, C++ & Csharp
  • Utilizing Trade-craft for Red Teaming in Hardened Environment
  • Leveraging Endpoint Security Controls (AV, EDR) & so much more…

Red Team Resource Development​

  • Enterprise Security Controls Architecture
  • Bypassing / Circumventing Initial Access Defenses
  • Red Team Infrastructure Development
  • Initial Access by Abusing Enterprise Applications
  • Custom scripts / code for Operational Security

Trade-craft Development for Offensive Operations​

  • Hands-on offensive trade-craft development (C# & Windows API)
  • Fully Undetectable (FUD) payload creation strategies
  • Understanding Microsoft & Linux Based Security Controls
  • Defense Evasion Strategies for malware development

Utilizing Trade-craft for Red Teaming in Hardened Environment​

  • Microsoft based security controls defense evasion
  • Circumventing Host & Network based security controls
  • Interesting Cross Forest Trust abuse scenario
  • Custom ways for credential access in windows & Linux boxes
  • Real-World Engagement case scenarios

Blinding Endpoint Defenses [Explicit Edition]​

  • ETW & EDR Basics
  • Deep Diving into endpoint security internals
  • Evasion Strategies & Exercises
  • FUD ETW & EDR Bypasses
  • Enterprise Security Controls Lab Access

Syllabus​

This link is hidden for visitors. Please Log in or register now.

Download​

Free download for users PRIV8

Password​

htdark.com
Back
Top