Top Categories

Spotlight

todayMay 7, 2024

Cyber Security Hubbl3

Survivorship Bias and How Red Teams Can Handle It

Reporting is, by nature, only the threat actors that have been caught. What about all the ones that didn’t get caught? There is no way to examine that and It comes down to the fact that we don’t know what they did and therein lies the problem for threat emulation.


Empire Operations - I

Register


$249.00

Course Summary

Empire Operations I is an introductory hands-on course with the Empire Post Exploitation Framework. In this course, students will learn the basics of using and operating Empire while being introduced to core red team principles and workflows. Students will learn to establish C2 infrastructure, deploy customized payloads in C#, PowerShell, Python, and IronPython, and basic Empire customization. As part of this course, students will learn how to leverage core Empire modules, customize indicators of compromise and leverage Empire’s powerful plugin capability. Students will walk through building a plugin and finally put their skills to the test in a full active directory lab environment.


Course Topics

check Overview of Basic Functionality

check Custom Listener Configuration

check Tailoring Payload and Stagers

check Importing Custom Bypasses

check Multi-member Team Management

check Module and Tool Development

check Introduction to Empire Plugins and Script Customization


Upcoming Courses


my_locationOn-Demandlocation_onVirtual

Empire Operations – I (On-Demand)

More info