Ingress Tool Transfer
This course gives cybersecurity professionals an in-depth understanding of the MITRE TTP T1105 technique. This involves using legitimate tools to transfer malicious files onto a target network and the techniques used to evade detection. The course will also cover prevention strategies for this type of attack.
Already have an account? Sign In »
Module 1: Introduction
Module 2: What is Technique T1056.001?
Module 3: What is Sub-Technique T1056.001?
Module 4: Magic Hound Lab
This course will cover the technique:
T1105: Ingress Tool Transfer is used by MITRE to describe a type of cyber attack where an attacker gains access to a victim's network by transferring an external tool or software into the victim's environment. This external tool can be any software or application that an attacker uses to gain unauthorized access to the victim's network.
T1056.001: Input Capture: Keylogging involves using software or hardware to record the keystrokes entered on a keyboard. Adversaries can use this technique to capture sensitive information, such as passwords or credit card numbers, which can then be used to gain unauthorized access to a computer system or network.
Learn how to detect and mitigate these techniques to protect your organization from this type of attack. Apply what you learn and get the hands-on skills you need in Cybrary's MITRE ATT&CK Framework courses aligned to tactics and techniques used by threat actors.
Red Team Operator
Complete this entire course to earn a Ingress Tool Transfer Certificate of Completion