Command and Control with Covenant

Command and Control with Covenant

.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 20m | 49 MB

Instructor: Aaron Rosenmund
Covenant C2 command and control uses just-in-time, in-memory, .NET compilation, and dynamic profiles to fool defensive detections. Skill up your red team techniques by leveraging the next generation of adversary command and control capabilities.

Testing systems against advanced adversary techniques is required not just for red team operations but for targeted testing of defensive and detective measures on a network. Growing the skills to emulate the steadily advancing adversary capabilities within your team is a moving target that is complicated by the multitude of attack techniques available. In this course, Command, and Control with Covenant, you will gain the ability to leverage the advanced .NET, in-memory compilation techniques used by the open-source Covenant project to emulate adversary communication within an environment. First, you will learn to install the command and control infrastructure used to control compromised systems. Next, you will explore how to create and install implants called grunts to connect back to the adversary server. Finally, you will explore how to run tasks, gather information, and spread laterally within the Covenant C2 framework. When you are finished with this course, you will have the skills and knowledge of the Covenant command and control framework needed to emulate post-exploitation techniques aligned with Mitre ATT&CK.

Download:

http://longfiles.com/gsr2neyiwarj/Command_and_Control_with_Covenant.rar.html

[Fast Download] Command and Control with Covenant


Related eBooks:
SAS Ultimate Guide to Combat: How to Fight and Survive in Modern Warfare (General Military)
Azure Active Directory Security
AWS Security Best Practices: Abstract and Container Services
AWS Identity Federation
DevSecOps: Burning Questions
Algebraic Aspects of the Advanced Encryption Standard
Trusted Computing for Embedded Systems
CWAP? Certified Wireless Analysis Professional Official Study Guide
Windows 10: Security Yes, but Privacy Please
CEH v9: Certified Ethical Hacker Version 9 Study Guide, 3rd Edition
Ice, Mud and Blood: Lessons from Climates Past
Online Terrorist Propaganda, Recruitment, and Radicalization
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.