YoVDO

Discovery with Seatbelt

Offered By: Pluralsight

Tags

Penetration Testing Courses Cybersecurity Courses

Course Description

Overview

After getting access to few servers in the environment your job is to discovery sensitive information about the environment. In this course, you will learn discovery using Seatbelt.

In a red team engagement, after getting access to some servers, it is important that you enumerate sensitive information about the environment so you can move laterally and execute your red-team objectives. In this course, Discovery with Seatbelt, you'll learn how to utilize the Seatbelt tool to enumerate crucial information about the targets in a red team environment. First, you’ll explore the basics of discovery and how to compile and run the Seatbelt tool. Next, you'll see how to use Seatbelt to discover sensitive data of a local machine. Finally, you’ll learn how to collect information about remote targets using the Seatbelt tool. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques [Account Discovery (T1087), Security Software Discovery (T1518.001) and System Information Discovery (T1082)] using Seatbelt. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.

Syllabus

  • Course Overview 1min
  • Discovery with Seatbelt 17mins
  • Resources 1min

Taught by

Ricardo Reimao

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent