Initial Access
Different Techniques to gain Initial Access to the Target System.
Weaponization
Introduces how to Build Custom Payloads (HTA - VBA etc.) to get Initial Access.Password Attacks
Introduces the Fundamental Techniques to Perform a Successful Password Attack. This Module Includes Password Profiling - Offline/Online Attacks - Password Spraying.Phishing
Fundamentals of what Phishing is and how to use it to our Advantage.
Post Compromise
Different Techniques after gaining Initial Foothold on the Network.