Evasive Maneuvers and Post Exploitation

CYBRScore
Cyberscore

In this lab, you will (1) Use a port scanner to verify compliance with an existing egress policy, (2) Bypass the egress policy using a penetration-testing tool, (3) Gain real time access to a webmail session using a post-exploitation technique and (4) Demonstrate how it is possible to evade virus detection by Windows Defender.

Time
1 hour
Difficulty
Intermediate
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

In this lab, you will (1) Use a port scanner to verify compliance with an existing egress policy, (2) Bypass the egress policy using a penetration-testing tool, (3) Gain real time access to a webmail session using a post-exploitation technique and (4) Demonstrate how it is possible to evade virus detection by Windows Defender.