Jump to content


  • Content Count

  • Joined

  • Last visited

Community Reputation

823 Excellent

About HellsingAlucard

  • Rank
    Junior Member
  • Birthday 10/09/1987

Profile Information

  • Gender

Recent Profile Visitors

62 profile views
  1. CS 137 — Programming Principles CS 138 — Data Abstraction and Implementation MATH 115 — Linear Algebra for Engineering MATH 117 — Calculus 1 for Engineering MATH 119 — Calculus 2 for Engineering MATH 135 — Algebra for Honours Mathematics ECE 105 — Physics of Electrical Engineering 1 ECE 106 — Electricity and Magnetism ECE 124 — Digital Circuits and Systems ECE 140 — Linear Circuits SE 101 — Methods of Software Engineering CHE 102 Chemistry for Engineers ECE 222 Digital Computers (includes assembly language) ECE 358 Computer Networks MATH 213 Advanced Mathematics for Software Engineers MATH 239 Introduction to Combinatorics STAT 206 Statistics for Software Engineering MSCI 261 Engineering Economics: Financial Management for Engineers CS 241 Foundations of Sequential Programs CS 240 Data Structures and Data Management CS 247 Software Engineering Principles <- not required for Computer Science majors CS 341 Algorithms CS 349 User Interfaces <- not required for Computer Science majors CS 343 Concurrent and Parallel Programming <- not required for Computer Science majors CS 348 Introduction to Database Management SE 212 Logic and Computation SE 350 Operating Systems SE 465 Software Testing and Quality Assurance SE 464 Software Design and Architectures SE 463 Software Requirements Specification and Analysis SE 490 Design Project
  2. Udemy – SOC Analyst Training with Hands-on to SIEM from Scratch English | Size: 4.33 GB Genre: eLearning What you’ll learn • Become The SOC BOSS In SOC Operation • TCP/IP Procotol Suites with the Detailed summary of Headers in Data Packet • UseCases based on the Industry Standards, Helps Student to understand the attack which helps in the identification, Investigation, and Remediation of Cyber Attacks • Network and Security Device Working, Cyber attacks and Remediation • Application attacks Identification, Investigation and Recommended solution • Windows Domain Controller working and solution for the cyber attack on Authentication and Exploitation. • Threat Hunting with the IOC’s • SIEM Architecture and Correlation Rule • SIEM Dashboard creation and usage in the investigation • This course will be helpful for those who want to get a good job and knowledge in Cyber Security to earn money. [hide] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]]
  4. The importance of Active Directory in an enterprise cannot be stressed enough. Used by more than 90% of Fortune 1000 companies, the all-pervasive AD is the focal point for adversaries. Still, when it comes to AD security, there is a large gap of knowledge, which security professionals and administrators struggle to fill. Over the years, we have taught numerous professionals in real world trainings on AD security and always found that there is a lack of quality material, which can take students from basics of Active Directory security, and teach them how to attack and defend it. Attacking and Defending Active Directory is beginner friendly course designed for security professionals who would like to enhance their AD security knowledge and want to understand practical threats and attacks in a modern Active Directory environment. The course is based on our years of experience of making and breaking Windows and AD environments and teaching security professionals. We cover topics like AD enumeration, trusts mapping, domain privilege escalation, domain persistence, Kerberos based attacks (Golden ticket, Silver ticket and more), ACL issues, SQL server trusts, Defenses and bypasses of defenses. You can either create your own Active Directory lab and follow along, or subscribe to one of our premium labs. A non-exhasutive list of topics to be covered include: – Active Directory Enumeration. Use scripts, built-in tools and MS ActiveDirectory module to enumerate the target domain. * Understand how useful information like users, groups, group memberships, computers, user properties etc. from the domain controller is available to even a normal user. * Understand and enumerate intra-forest and inter-forest trusts. Practice how to extract information from the trusts. * Enumerate Group policies. * Enumerate ACLs and learn to find out ‘interesting rights on ACLs in the target domain to carry out attacks. – Local Privilege Escalation * Learn different local privilege escalation techniques on a Windows machine. * Hunt for local admin privileges on machines in the target domain using multiple methods. * Abuse enterprise applications to execute complex attack paths that involve bypassing antivirus and pivoting to different machines. – Domain Privilege Escalation * Learn to find credentials and sessions of high privileges domain accounts like Domain Administrators, extracting their credentials and then using credential replay attacks to escalate privileges, all of this with just using built-in protocols for pivoting. * Learn to extract credentials from a restricted environment where application whitelisting is enforced. Abuse derivative local admin privileges and pivot to other machines to escalate privileges to domain level. * Understand the classic Kerberoast and its variants to escalate privileges. * Enumerate the domain for objects with unconstrained delegation and abuse it to escalate privileges. * Find domain objects with constrained delegation enabled. Understand and execute the attacks against such objects to escalate privileges to a single service on a machine and to the domain administrator using alternate tickets. * Learn how to abuse privileges of Protected Groups to escalate privileges. – Domain Persistence and Dominance * Abuse Kerberos functionality to persist with DA privileges. Forge tickets to execute attacks like Golden ticket and Silver ticket to persist. * Subvert the authentication on the domain level with Skeleton key and custom SSP. * Abuse the DC safe mode Administrator for persistence. * Abuse the protection mechanism like AdminSDHolder for persistence. * Abuse minimal rights required for attacks like DCSync by modifying ACLs of domain objects. * Learn to modify the host security descriptors of the domain controller to persist and execute commands without needing DA privileges. – Cross trust attacks * Learn to elevate privileges from Domain Admin of a child domain to Enterprise Admin on the forest root by abusing Trust keys and krbtgt account. * Execute intra-forest trust attacks to access resources across forest. * Abuse database links to achieve code execution across forest by just using the databases. – Forest persistence and dominance * Understand forest persistence technique like DCShadow. Execute it to modify objects in the forest root without leaving change logs. Learn minimal permissions required to use DCShadow and avoid change logs for minimal permissions using Shadowception. – Defenses – Monitoring * Learn about useful events logged when the discussed attacks are executed. – Defenses and bypass – Architecture and Work culture Changes * Learn briefly about architecture and work culture changes required in an organization to avoid the discussed attacks. We discuss Temporal group membership, ACL Auditing, LAPS, SID Filtering, Selective Authentication, credential guard, device guard, Protected Users Group, PAW, Tiered Administration and ESAE or Red Forest. * Learn how Microsoft’s Advanced Threat Analytics and other similar tools detect domain attacks and the ways to avoid and bypass such tools. – Defenses and bypass – Deception * Understand how Deception can be effective deployed as a defense mechanism in AD. Deploy decoy user objects, which have interesting properties set, which have ACL rights over other users and have high privilege access in the domain along with available protections. Deploy computer objects and Group objects to deceive an adversary. Learn how adversaries can identify decoy objects and how defenders can avoid the detection. – Defenses and bypass – PowerShell * Learn about various improvements in Windows PowerShell v5 and their significance in detecting attacks. We will discuess System Wide Transcription, Enhance logging, Constrained Language Mode, AMSI etc. Learn how JEA helps in secure administration. Execute bypasses against the discussed defenses and the detection of bypasses. [Hidden Content]
  5. will you upload this course to my mega account SANS 401 [hide][Hidden Content]] Make use of Hide Tag while posting download links. Usage: [ hide ] link [ /hide ] (without spaces). Read the Board Rules or get banned.
  6. thanks will you upload this course to my mega account SANS 401 [hide][Hidden Content]]
  7. there is script written with python you can download courses from udemy with it
  8. Cisco Press - Security Penetration Testing for Today's DevOps and Cloud Environments [Hidden Content] Thanks to @bvn63 Make use of hide tag while posting download links. Read board rules. Usage: [ hide ] link [ /hide ] (without spaces) Give certcollection link to the post by bvn63 instead of posting individual download links.
  9. CBT NUGGETS CISSP 2019 [hide][Hidden Content]] I have PACKT CISSP 2019 also
  • Create New...