Evasive Maneuvers and Post Exploitation
In this lab, you will (1) Use a port scanner to verify compliance with an existing egress policy, (2) Bypass the egress policy using a penetration-testing tool, (3) Gain real time access to a webmail session using a post-exploitation technique and (4) Demonstrate how it is possible to evade virus detection by Windows Defender.

Overview
In this lab, you will (1) Use a port scanner to verify compliance with an existing egress policy, (2) Bypass the egress policy using a penetration-testing tool, (3) Gain real time access to a webmail session using a post-exploitation technique and (4) Demonstrate how it is possible to evade virus detection by Windows Defender.

Learning Partner

CYBRScore
Cybersecurity Technical Hands-on Labs