Discovery with Seatbelt
After getting access to few servers in the environment your job is to discovery sensitive information about the environment. In this course, you will learn discovery using Seatbelt.
In a red team engagement, after getting access to some servers, it is important that you enumerate sensitive information about the environment so you can move laterally and execute your red-team objectives. In this course, Discovery with Seatbelt, you’ll learn how to utilize the Seatbelt tool to enumerate crucial information about the targets in a red team environment. First, you’ll explore the basics of discovery and how to compile and run the Seatbelt tool. Next, you’ll see how to use Seatbelt to discover sensitive data of a local machine. Finally, you’ll learn how to collect information about remote targets using the Seatbelt tool. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques [Account Discovery (T1087), Security Software Discovery (T1518.001) and System Information Discovery (T1082)] using Seatbelt. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.
Author Name: Ricardo Reimao
Author Description:
Ricardo is a Cybersecurity Consultant based in Toronto (Canada). He has 14+ years of IT experience, 10 of them in the IT Security field. His main interests are: SIEM solutions (IBM QRadar), Enterprise Security Risk, Penetration Testing, Security processes/procedures and Network Security.
Table of Contents
- Course Overview
1min - Discovery with Seatbelt
17mins - Resources
1min
There are no reviews yet.