SANS SEC699.2 Initial Intrusion Strategies Emulation & Detection
فهرست مطالب کتاب SANS SEC699.2 Initial Intrusion Strategies Emulation & Detection:
Initial Intrusion Strategies
Traditional Attack Strategies & Defenses
Emulating Adversarial Techniques & Detections
Anti-Malware Scanning Interface (AMSI)
Office Macro Obfuscation Techniques
Exercise: VBA Stomping, Purging & AMSI Bypasses
Application Execution Control
Exercise: Bypassing Application Execution Control
ExploitGuard & Attack Surface Reduction Rules
Exercise: Bypassing Attack Surface Reduction
Going Stealth – Process Shenanigans
Zooming in on Windows Internals
Bypassing Security Products Through Process Shenanigans
Hunting for These Shenanigans
Exercise: Bypassing Modern Security Products
Conclusions
SANS SEC699.3 Lateral Movement Emulation & Detection
فهرست مطالب کتاب SANS SEC699.3 Lateral Movement Emulation & Detection:
Active Directory Enumeration
BloodHound Enumeration
Exercise: Analyzing BloodHound Attack Chains
Credential Dumping
LSASS Credential Stealing Techniques
Exercise: Stealing Credentials from LSASS
Stealing Credentials Without Touching LSASS
Exercise: Internal Monologue in NTLMv1 Downgrades
Stealing NTLMv2 Challenge-Response
Exercise: Creative NTLMv2 Challenge-Response Stealing
Kerberos Attacks
Kerberos Refresh
Unconstrained Delegation Attacks
Exercise: Unconstrained Delegation Attacks
(Resource-Based) Constrained Delegation
Exercise: (Resource-Based) Constrained Delegation
Conclusions
SANS SEC699.4 Persistence Emulation & Detection
فهرست مطالب کتاب SANS SEC699.4 Persistence Emulation & Detection:
Pivoting Between Domains & Forests
Breaking Domain & Forest Trusts
Exercise: Pivoting between Domains & Forests
Persistence Techniques
COM Object Hijacking
Exercise: COM Object Hijacking
WMI Persistence
Exercise: WMI Persistence
AppCert, AppInit & Netsh Helper DLL
Exercise: Implementing Netsh Helper DLL
Office Template & Library Tricks
Exercise: Office Persistence
Application Shimming
Exercise: Application Shimming
Stealth AD Persistence & Manipulation
Exercise: Stealth AD Persistence
Conclusions
SANS SEC699.5 Azure AD & Emulation Plans
فهرست مطالب کتاب SANS SEC699.5 Azure AD & Emulation Plans:
Azure AD
Azure AD Structure and Management
Azure AD Hybrid Authentication
Azure AD Authentication Methods
Azure AD Conditional Access
Introduction to Azure Identities
Azure AD Security Logging
Executing emulation plans
APT-28 Emulation Plan
Exercise: APT-28 Emulation Plan
APT-34 Emulation Plan
Exercise: APT-34 Emulation Plan
Turla Emulation Plan
Exercise: Turla Emulation plan
SANS SEC699.6 Adversary Emulation Capstone
فهرست مطالب کتاب SANS SEC699.6 Adversary Emulation Capstone:
Capstone
Capstone Introduction – Live Events
Capstone Introduction – OnDemand