Initial Access & Persistence
Learn how to produce complex infection chains for initial access and persistence.
This course is intended for those looking to understand initial access strategies used by real-world adversaries.
Build complex infection chains using a variety of payload formats.
Understand mitigating technologies such as 'Mark of the Web'.
Make your initial access malware persistent on a machine.
Introduction
FREE PREVIEWHow to use this course
Before we begin...
Modern Taxonomy
Triggers
Payloads
MotW & SmartScreen
Containers
Delivery
Phishing Templates
FREE PREVIEWCode Signing
Droppers
The Importance of Persistence
Task Scheduler
FREE PREVIEWStartup Folder
Registry Run Keys
COM Hijacking
Further Resources
Before you go...
10/10, must read content that makes a complex process a sequence of small achievable steps
10/10, must read content that makes a complex process a sequence of small achievable steps
Read Less