Initial Access Operations | FortyNorth Security


Initial Access Operations | FortyNorth Security
English | Size: 4.82 GB
Genre: eLearning

One of the most critical aspects of any red team assessment is obtaining initial access into your target’s environment. The ability to capture valid credentials or execute code within your target’s environment is the first step toward accomplishing the rest of your assessment goals.

In this course, students will learn a variety of techniques used by attackers to phish companies and then write their own malware in a hands-on environment.

This class will cover a wide range of topics over a two-day period:

Development Environment Prep – We start by building multiple development environments (within virtual machines) for writing malware. We discuss the different tools, languages, and operating system configurations that our malware developers use when writing code and then set them up in our virtual machines.
Malware/Campaign Goals – When writing phishing malware, we typically have one of two goals: harvest credentials from our victim or execute arbitrary code on their workstation.
Credential Harvesting – Harvesting account credentials can be very dependent upon the type of services your target has publicly available. Is there a VPN portal, outlook web access, HR self-service portal, Citrix access? Ultimately, your goal is to entice the user to enter their credentials into a web form that securely saves their information and possibly their multi-factor token. We’ll look at both custom code and existing open source tooling which helps to accomplish this objective.
Arbitrary Code Execution – Code execution typically will result in a Meterpreter or Cobalt Strike Beacon connecting back to your command and control servers when your attack vector is executed by the targeted employee. To accomplish the code execution objective, we discuss and customize browser-based attacks that attackers use to accomplish this objective.
Code Execution Deep Dive – After looking at examples of how attackers can leverage web browsers to execute code on their target’s systems, we do a deep-dive into different methods of customizing code execution malware.
Process Injection Techniques – There are many ways that an attacker can inject code not only into its current process, but also other processes that are running on the targeted system. We discuss the pros and cons of injecting into remote processes and walk through the different API calls that enable these capabilities.
DotNetToJScript – The tool DotNetToJScript has changed how the industry writes phishing malware. It has extended the functionality of “low capability” browser-compatible languages to match that of fully functional development languages. We walk through how you can use different process injection techniques within a browser-based attack with DotNetToJScript.
Code Protection/Targeted Malware – Why spend all that time writing your own malware with the latest techniques available to let anyone arbitrarily run it and possibly write detections for it? You’re going to learn multiple techniques to not only attempt to prevent your code from running in any form of a sandbox, but also how to ensure your malware only runs on the system(s) you are targeting.
At the conclusion of the class, students will have a strong understanding of different techniques used by modern attackers in phishing attacks. Additionally, all students will have learned various methods to extend basic phishing attacks to include process injection techniques that are used to avoid detection.

Note: While this is an introductory class, attendees should have an understanding of basic programming concepts to get the most out of this class. Experience with .NET would be extremely beneficial. This course is geared toward attacking Window’s environments and all malware written during class will be for Window’s targets.

rapidgator.net/file/5b38f7201201a9a96a086c99c2339a9c/FortyNorth-Initial-Access-Operations.part1.rar.html
rapidgator.net/file/49e22dd7f0aa1aac3a7ca3fa5fd46e24/FortyNorth-Initial-Access-Operations.part2.rar.html
rapidgator.net/file/cd45506ac62c9d0ec0e30f72441af1bd/FortyNorth-Initial-Access-Operations.part3.rar.html
rapidgator.net/file/506090f84caa6ec6457d6b41e70c168e/FortyNorth-Initial-Access-Operations.part4.rar.html
rapidgator.net/file/2fa7b131d76e56f9e544e6cc646a6ef1/FortyNorth-Initial-Access-Operations.part5.rar.html

nitroflare.com/view/89C6EB7000EFF71/FortyNorth-Initial-Access-Operations.part1.rar
nitroflare.com/view/D8CE20D38CB78B5/FortyNorth-Initial-Access-Operations.part2.rar
nitroflare.com/view/90B8D2C18B23BA8/FortyNorth-Initial-Access-Operations.part3.rar
nitroflare.com/view/3D55B33025195DF/FortyNorth-Initial-Access-Operations.part4.rar
nitroflare.com/view/5B1D0EF88BF10DC/FortyNorth-Initial-Access-Operations.part5.rar

If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.