$10

🔥 Best Seller 🔥 - E-Book - OSEP OffSec Advanced Evasion Techniques and Breaching Defenses

I want this!

🔥 Best Seller 🔥 - E-Book - OSEP OffSec Advanced Evasion Techniques and Breaching Defenses

$10

Topics covered in the Advanced Evasion Techniques and Breaching Defenses PDF (PEN-300)

1. Operating System and Programming Theory

This comprehensive module provides a deep understanding of the inner workings of operating systems and fundamental programming concepts. You'll study memory management, process scheduling, file systems, and other essential OS components, gaining a solid foundation for understanding and exploiting vulnerabilities.

2. Client-Side Code Execution with Office

This module focuses on leveraging known vulnerabilities in Microsoft Office applications (Word, Excel, PowerPoint) to craft malicious documents that trigger code execution on a victim’s machine, allowing unauthorized access and control.

3. Client-Side Code Execution with Jscript

Learn how to exploit Jscript, a scripting language used in Windows environments, for code execution attacks, gaining unauthorized access and control on a victim’s machine.

4. Process Injection and Migration

In this module, you'll master the art of stealth and persistence by injecting your malicious code into legitimate running processes. You'll also learn how to migrate between processes to evade detection and maintain control even if one process is terminated.

5. Introduction to Antivirus Evasion

This module introduces basic techniques to bypass or evade antivirus software, such as obfuscation and packing, allowing you to create malware that goes undetected.

6. Advanced Antivirus Evasion

Learn more sophisticated methods like signature-based and heuristic-based evasion, enabling you to create malware that goes undetected by even the most sophisticated antivirus solutions.

7. Application Whitelisting

Learn how to circumvent application whitelisting, a security measure that restricts the execution of unauthorized software.

8. Bypassing Network Filters

Discover various advanced techniques to bypass network filters and firewalls, gaining access to restricted resources and networks.

9. Linux Post-Exploitation

This module covers a wide range of techniques for maintaining access and escalating privileges on compromised Linux systems. You'll learn how to navigate file systems, manipulate user accounts, extract sensitive information, and establish persistent backdoors for future access.

10. Windows Post-Exploitation

Learn various advanced techniques for maintaining access and escalating privileges on compromised Windows systems, including navigating file systems, manipulating user accounts, extracting sensitive information, and establishing persistent backdoors.

I want this!
Size
27 MB
Length
704 pages
Copy product URL