SANS SEC670.5 Enhancing Your Implant Shellcode, Evasion, and C2
فهرست مطالب کتاب SANS SEC670.5 Enhancing Your Implant Shellcode, Evasion, and C2:
Custom Loaders
Lab 5.1: The Loader
Unhooking Hooks
Lab 5.2: UnhookTheHook
Bypassing AV/EDR
Calling Home
Lab 5.3: No Caller ID
Writing Shellcode in C
Bootcamp
Lab 5.4: AMSI No More
Lab 5.5: ShadowCraft
SANS SEC699 Workbook Sections 1-3
فهرست مطالب کتاب SANS SEC699 Workbook Sections 1-3:
Day 1: Introduction to Purple-Teaming Tools
Day 2: Advanced Initial Execution
Day 3: Advanced Active Directory and Kerberos Attacks
SANS SEC699 Workbook Sections 4 _ 5
فهرست مطالب کتاب SANS SEC699 Workbook Sections 4 & 5:
Day 4: Stealth Persistence Strategies
Day 5: Adversary Emulation
SANS SEC699.1 Adversary Emulation for Breach Prevention & Detection
فهرست مطالب کتاب SANS SEC699.1 Adversary Emulation for Breach Prevention & Detection:
Introduction
Course objectives
Building our lab environment
Introducing the lab architecture
Exercise: Deploying the lab environment
Purple teaming organization
Exercise: Introduction to VECTR™
Key tools
Building a stack for detection
Assessing detection coverage
Rule-based versus anomaly-based detection
Exercise: Preparing our Elastic and SIGMA stack
Building a stack for adversary emulation
Exercise: Preparing adversary emulation stack
Automated emulation using MITRE Caldera
Exercise: Caldera
SANS SEC699.2 Initial Intrusion Strategies Emulation & Detection
فهرست مطالب کتاب SANS SEC699.2 Initial Intrusion Strategies Emulation & Detection:
Initial Intrusion Strategies
Traditional Attack Strategies & Defenses
Emulating Adversarial Techniques & Detections
Anti-Malware Scanning Interface (AMSI)
Office Macro Obfuscation Techniques
Exercise: VBA Stomping, Purging & AMSI Bypasses
Application Execution Control
Exercise: Bypassing Application Execution Control
ExploitGuard & Attack Surface Reduction Rules
Exercise: Bypassing Attack Surface Reduction
Going Stealth – Process Shenanigans
Zooming in on Windows Internals
Bypassing Security Products Through Process Shenanigans
Hunting for These Shenanigans
Exercise: Bypassing Modern Security Products
Conclusions
SANS SEC699.3 Lateral Movement Emulation & Detection
فهرست مطالب کتاب SANS SEC699.3 Lateral Movement Emulation & Detection:
Active Directory Enumeration
BloodHound Enumeration
Exercise: Analyzing BloodHound Attack Chains
Credential Dumping
LSASS Credential Stealing Techniques
Exercise: Stealing Credentials from LSASS
Stealing Credentials Without Touching LSASS
Exercise: Internal Monologue in NTLMv1 Downgrades
Stealing NTLMv2 Challenge-Response
Exercise: Creative NTLMv2 Challenge-Response Stealing
Kerberos Attacks
Kerberos Refresh
Unconstrained Delegation Attacks
Exercise: Unconstrained Delegation Attacks
(Resource-Based) Constrained Delegation
Exercise: (Resource-Based) Constrained Delegation
Conclusions
SANS SEC699.4 Persistence Emulation & Detection
فهرست مطالب کتاب SANS SEC699.4 Persistence Emulation & Detection:
Pivoting Between Domains & Forests
Breaking Domain & Forest Trusts
Exercise: Pivoting between Domains & Forests
Persistence Techniques
COM Object Hijacking
Exercise: COM Object Hijacking
WMI Persistence
Exercise: WMI Persistence
AppCert, AppInit & Netsh Helper DLL
Exercise: Implementing Netsh Helper DLL
Office Template & Library Tricks
Exercise: Office Persistence
Application Shimming
Exercise: Application Shimming
Stealth AD Persistence & Manipulation
Exercise: Stealth AD Persistence
Conclusions
SANS SEC699.5 Azure AD & Emulation Plans
فهرست مطالب کتاب SANS SEC699.5 Azure AD & Emulation Plans:
Azure AD
Azure AD Structure and Management
Azure AD Hybrid Authentication
Azure AD Authentication Methods
Azure AD Conditional Access
Introduction to Azure Identities
Azure AD Security Logging
Executing emulation plans
APT-28 Emulation Plan
Exercise: APT-28 Emulation Plan
APT-34 Emulation Plan
Exercise: APT-34 Emulation Plan
Turla Emulation Plan
Exercise: Turla Emulation plan
SANS SEC699.6 Adversary Emulation Capstone
فهرست مطالب کتاب SANS SEC699.6 Adversary Emulation Capstone:
Capstone
Capstone Introduction – Live Events
Capstone Introduction – OnDemand