Curriculum
- 9 Sections
- 9 Lessons
- 80 Hours
Expand all sectionsCollapse all sections
- Operating System and Programming Theory1
- Client-Side Code Execution with Office1
- Client-Side Code Execution with Jscript1
- Process Injection and Migration1
- Introduction to Antivirus Evasion1
- Advanced Antivirus Evasion1
- Bypassing Network Filters1
- Linux Post-Exploitation1
- Windows Post-Exploitation1
This module focuses on leveraging known vulnerabilities in Microsoft Office applications (Word, Excel, PowerPoint) to craft malicious documents that trigger code execution on a victim’s machine, gaining unauthorized access and control.
Prev
In this module, you’ll master the art of stealth and persistence by injecting your malicious code into legitimate running processes. You’ll also learn how to migrate between processes to evade detection and maintain control even if one process is terminated.
Next