Genre: eLearning | Language: English
Windows Management Instrumentation (WMI) has been used by Windows administrators for various system management operations since Windows NT. As WMI is often used to automate administrative tasks, it is of equal use for attackers as it is for defenders. It is very helpful to understand WMI and its working to be able to fully utilize its power both for Red and Blue teams.
In this training through demonstrations and hands-on, we will discuss how WMI and CIM can be utilized for offensive as well as defensive security. Different utilities like PowerShell built-in cmdlets, PowerShell scripts, native windows tools and Linux tools will be discussed. Various attacks like enumeration and information gathering, lateral movement, persistence, backdoors, modifying security descriptors etc. will be executed by utilizing WMI. We will also discuss how WMI can be used for agentless monitoring, detection of above mentioned attacks and more.
Download rapidgator
https://rg.to/file/2f2764238169f40b3b78905940a5d312/WMIAttacksDefense.part1.rar.html
https://rg.to/file/177f9c622f3f1894befd093524855c82/WMIAttacksDefense.part2.rar.html
https://rg.to/file/85cba836d5cfbc1f239ac43ecb7f7b9f/WMIAttacksDefense.part3.rar.html
https://rg.to/file/92c00134877888d8234036ca60e7faf2/WMIAttacksDefense.part4.rar.html
https://rg.to/file/2239b95a899df40de01056dbc60e2958/WMIAttacksDefense.part5.rar.html
https://rg.to/file/79c737bba9fd5f71222bfc1a57d9362a/WMIAttacksDefense.part6.rar.html
Download nitroflare
http://nitroflare.com/view/9A0A24688B4CB91/WMIAttacksDefense.part1.rar
http://nitroflare.com/view/540F38182A80775/WMIAttacksDefense.part2.rar
http://nitroflare.com/view/0274E9EDA1F9648/WMIAttacksDefense.part3.rar
http://nitroflare.com/view/9B263F660A72237/WMIAttacksDefense.part4.rar
http://nitroflare.com/view/AD03559D627E78E/WMIAttacksDefense.part5.rar
http://nitroflare.com/view/55C4D4C486CB4A3/WMIAttacksDefense.part6.rar
Download 百度云
转载请注明:0daytown » WMI Attacks and Defense