Real threat actors utilize various Tactics, Techniques and Procedures (aka TTPs). One of the tactics is Persistence - a way to survive a breached machine restart and preserve access to a target environment. There is a lot of focus on what methods adversaries use to exploit a particular vulnerability or how their C2 channels and infrastructure look like. Less often you find discussions about persistence. This course is aiming to change that.
You will learn almost 30 different persistence techniques working on Windows 10. Most of them were used by nation-state threat actors, like Equation Group, Turla, APT29, Project Sauron or malware, including Flame or Stuxnet.
Download link:-
You must reply before you can see the hidden data contained here.
Last edited by a moderator: