Archives: Shop

  • Start your journey in Microsoft Windows Internals
  • Unveil common Win32/NT APIs used by the malwares
  • Understand malwares abusing internals from user-mode perspective
  • Perform various challenges/exercises to learn Windows Internals
  • Learn different kernel data structures (EPROCES, ETHREAD, KPCR etc.) through Windbg
  • Perform Threat Detection & Its Investigation over the suspected phishing, web-based, network-based, and host-centric attacks
  • Conduct an investigation utilizing numerous defensive solutions like incident response, network monitoring, SIEM, FIM etc.
  • Comprehend the entirety of the organization’s cyber-defense strategy and tactical approaches.
  • Practical familiarity with diverse investigative approaches and structured incident response mind map within organizational contexts.

Use BLUE20OFF coupon to get 20% OFF

  • Enumerating & Designing Attack Surface of Azure Cloud Services
  • Pivoting Azure Control Plane to the Data Plane
  • Understanding & Abusing Core Azure services
  • Stealth Persistence Access of Azure account by Service Principal
  • Privilege Escalation by abusing mis-configured Role Based Access Control
  • Mis-use Azure Authentication Methods [PHS, PTA, Federation] & so much more…
This is a staging enviroment