🔥 Best Seller 🔥 - E-Book - OSEP OffSec Advanced Evasion Techniques and Breaching Defenses
Topics covered in the Advanced Evasion Techniques and Breaching Defenses PDF (PEN-300)
1. Operating System and Programming Theory
This comprehensive module provides a deep understanding of the inner workings of operating systems and fundamental programming concepts. You'll study memory management, process scheduling, file systems, and other essential OS components, gaining a solid foundation for understanding and exploiting vulnerabilities.
2. Client-Side Code Execution with Office
This module focuses on leveraging known vulnerabilities in Microsoft Office applications (Word, Excel, PowerPoint) to craft malicious documents that trigger code execution on a victim’s machine, allowing unauthorized access and control.
3. Client-Side Code Execution with Jscript
Learn how to exploit Jscript, a scripting language used in Windows environments, for code execution attacks, gaining unauthorized access and control on a victim’s machine.
4. Process Injection and Migration
In this module, you'll master the art of stealth and persistence by injecting your malicious code into legitimate running processes. You'll also learn how to migrate between processes to evade detection and maintain control even if one process is terminated.
5. Introduction to Antivirus Evasion
This module introduces basic techniques to bypass or evade antivirus software, such as obfuscation and packing, allowing you to create malware that goes undetected.
6. Advanced Antivirus Evasion
Learn more sophisticated methods like signature-based and heuristic-based evasion, enabling you to create malware that goes undetected by even the most sophisticated antivirus solutions.
7. Application Whitelisting
Learn how to circumvent application whitelisting, a security measure that restricts the execution of unauthorized software.
8. Bypassing Network Filters
Discover various advanced techniques to bypass network filters and firewalls, gaining access to restricted resources and networks.
9. Linux Post-Exploitation
This module covers a wide range of techniques for maintaining access and escalating privileges on compromised Linux systems. You'll learn how to navigate file systems, manipulate user accounts, extract sensitive information, and establish persistent backdoors for future access.
10. Windows Post-Exploitation
Learn various advanced techniques for maintaining access and escalating privileges on compromised Windows systems, including navigating file systems, manipulating user accounts, extracting sensitive information, and establishing persistent backdoors.