Exfiltration with CloakifyFactory
This course will teach you Exfiltration using CloakifyFactory.
Exfiltration consists of techniques that adversaries may use to steal data from your network. In this course, Exfiltration with CloakifyFactory, you’ll learn how to utilize CloakifyFactory to execute exfiltration techniques in a red team environment. First, you’ll discover exfiltration over C2. Next, you’ll apply exfiltration using a web service. Finally, you’ll simulate exfiltration over alternative protocol. When you’re finished with this course, you’ll have the skills and knowledge to execute techniques T1041, T1567.002, T1048.001 using CloakifyFactory. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.
Author Name: Rishalin Pillay
Author Description:
Rishalin is a prolific author and cybersecurity expert. He has authored several video courses on Pluralsight, as well as three books: “Learn Penetration Testing”, “Offensive Shellcode from Scratch.” and “Ethical Hacking Workshop”. He is also a technical contributor to many other books on topics such as dark web analysis, Kali Linux, offensive security, and SECOPS. He has received the Microsoft Content Publisher Gold and Platinum awards for his contributions to the cybersecurity industry. Rishal… more
Table of Contents
- Course Overview
1min - Exfiltration with CloakifyFactory
18mins - Resources
1min
There are no reviews yet.