TCMSecurity - Movement, Pivoting and Persistence

Currently reading:
 TCMSecurity - Movement, Pivoting and Persistence

serberus2012

Member
LV
1
Joined
Sep 8, 2023
Threads
10
Likes
10
Awards
5
Credits
16,385©
Cash
0$

Mpp new

Course Overview


Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers is the next step in YOUR penetration testing and ethical hacking journey.

Most engagements are conducted remotely, meaning that the tester must have the ability to move about freely from outside of the network into it. We do this using various techniques. Some of the simplest can be utilizing a compromised password to access a desktop environment via remote desktop and attempting to access other machines with those credentials. More complicated techniques include utilizing compromised endpoints to act as a proxy for us, forwarding traffic from internal targets back to our own.

MP&P will cover topics such as:

  • Username and Password List Generation
  • Password Spraying
  • Email Phishing
  • Command and Control (C2)
  • Credential Harvesting and Passing
  • Routing, Port Forwarding, SOCKS Proxies, and Bind Usage
  • Offensive PowerShell
  • How the Misconfigurations We See in Real Pentests Happen
  • Common Remediation Strategies You Can Use to Report to Clients

Download: https://mega.nz/folder/ajpyERxJ#Qf9qgsOdCcahLJL__DbXqA

VirusTotal: https://www.virustotal.com/gui/url/...d24769e30b14ea79585cecbe7b0c42f6ee6?nocache=1
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Top Bottom