Curriculum
- 9 Sections
- 9 Lessons
- 80 Hours
Expand all sectionsCollapse all sections
- Operating System and Programming Theory1
- Client-Side Code Execution with Office1
- Client-Side Code Execution with Jscript1
- Process Injection and Migration1
- Introduction to Antivirus Evasion1
- Advanced Antivirus Evasion1
- Bypassing Network Filters1
- Linux Post-Exploitation1
- Windows Post-Exploitation1
Discover various techniques to bypass network filters and firewalls, gaining access to restricted resources and networks.
Prev
Learn various techniques for maintaining access and escalating privileges on compromised Windows systems, including navigating file systems, manipulating user accounts, extracting sensitive information, and establishing persistent backdoors.
Next