Evasive Maneuvers and Post Exploitation

In this lab, you will (1) Use a port scanner to verify compliance with an existing egress policy, (2) Bypass the egress policy using a penetration-testing tool, (3) Gain real time access to a webmail session using a post-exploitation technique and (4) Demonstrate how it is possible to evade virus detection by Windows Defender.

Overview

In this lab, you will (1) Use a port scanner to verify compliance with an existing egress policy, (2) Bypass the egress policy using a penetration-testing tool, (3) Gain real time access to a webmail session using a post-exploitation technique and (4) Demonstrate how it is possible to evade virus detection by Windows Defender.

Learning Partner
CYBRScore
CYBRScore
Cybersecurity Technical Hands-on Labs