• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

TCMSecurity - Movement, Pivoting and Persistence (1 Viewer)

Currently reading:
 TCMSecurity - Movement, Pivoting and Persistence (1 Viewer)

Recently searched:

serberus2012

Member
LV
2
Joined
Sep 8, 2023
Threads
10
Likes
23
Awards
6
Credits
21,524©
Cash
0$

Mpp new

Course Overview


Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers is the next step in YOUR penetration testing and ethical hacking journey.

Most engagements are conducted remotely, meaning that the tester must have the ability to move about freely from outside of the network into it. We do this using various techniques. Some of the simplest can be utilizing a compromised password to access a desktop environment via remote desktop and attempting to access other machines with those credentials. More complicated techniques include utilizing compromised endpoints to act as a proxy for us, forwarding traffic from internal targets back to our own.

MP&P will cover topics such as:

  • Username and Password List Generation
  • Password Spraying
  • Email Phishing
  • Command and Control (C2)
  • Credential Harvesting and Passing
  • Routing, Port Forwarding, SOCKS Proxies, and Bind Usage
  • Offensive PowerShell
  • How the Misconfigurations We See in Real Pentests Happen
  • Common Remediation Strategies You Can Use to Report to Clients

Download: https://mega.nz/folder/ajpyERxJ#Qf9qgsOdCcahLJL__DbXqA

VirusTotal: https://www.virustotal.com/gui/url/...d24769e30b14ea79585cecbe7b0c42f6ee6?nocache=1
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom