Archives: Shop
- Start your journey in Microsoft Windows Internals
- Unveil common Win32/NT APIs used by the malwares
- Understand malwares abusing internals from user-mode perspective
- Perform various challenges/exercises to learn Windows Internals
- Learn different kernel data structures (EPROCES, ETHREAD, KPCR etc.) through Windbg
- Perform Threat Detection & Its Investigation over the suspected phishing, web-based, network-based, and host-centric attacks
- Conduct an investigation utilizing numerous defensive solutions like incident response, network monitoring, SIEM, FIM etc.
- Comprehend the entirety of the organization’s cyber-defense strategy and tactical approaches.
- Practical familiarity with diverse investigative approaches and structured incident response mind map within organizational contexts.
Use BLUE20OFF coupon to get 20% OFF
- Enumerating & Designing Attack Surface of Azure Cloud Services
- Pivoting Azure Control Plane to the Data Plane
- Understanding & Abusing Core Azure services
- Stealth Persistence Access of Azure account by Service Principal
- Privilege Escalation by abusing mis-configured Role Based Access Control
- Mis-use Azure Authentication Methods [PHS, PTA, Federation] & so much more…