Initial Access & Persistence
Learn how to produce complex infection chains for initial access and persistence.
This course is intended for those looking to understand initial access strategies used by real-world adversaries.
Build complex infection chains using a variety of payload formats.
Understand mitigating technologies such as 'Mark of the Web'.
Make your initial access malware persistent on a machine.
Introduction
FREE PREVIEWHow to use this course
Before we begin...
Modern Taxonomy
Triggers
Payloads
MotW & SmartScreen
Containers
Delivery
Phishing Templates
FREE PREVIEWCode Signing
Droppers
The Importance of Persistence
Task Scheduler
FREE PREVIEWStartup Folder
Registry Run Keys
COM Hijacking
Further Resources
Before you go...
Course Export
10/10, must read content that makes a complex process a sequence of small achievable steps
10/10, must read content that makes a complex process a sequence of small achievable steps
Read Less