Exfiltration with CloakifyFactory
Offered By: Pluralsight
Course Description
Overview
This course will teach you Exfiltration using CloakifyFactory.
Exfiltration consists of techniques that adversaries may use to steal data from your network. In this course, Exfiltration with CloakifyFactory, you’ll learn how to utilize CloakifyFactory to execute exfiltration techniques in a red team environment. First, you’ll discover exfiltration over C2. Next, you’ll apply exfiltration using a web service. Finally, you’ll simulate exfiltration over alternative protocol. When you’re finished with this course, you’ll have the skills and knowledge to execute techniques T1041, T1567.002, T1048.001 using CloakifyFactory. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.
Exfiltration consists of techniques that adversaries may use to steal data from your network. In this course, Exfiltration with CloakifyFactory, you’ll learn how to utilize CloakifyFactory to execute exfiltration techniques in a red team environment. First, you’ll discover exfiltration over C2. Next, you’ll apply exfiltration using a web service. Finally, you’ll simulate exfiltration over alternative protocol. When you’re finished with this course, you’ll have the skills and knowledge to execute techniques T1041, T1567.002, T1048.001 using CloakifyFactory. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.
Syllabus
- Course Overview 1min
- Exfiltration with CloakifyFactory 18mins
- Resources 1min
Taught by
Rishalin Pillay
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent