Magic Hound
Magic Hound (APT35) is an Iranian state-sponsored threat group that primarily targets organizations across various industries and geographic regions through cyber espionage. Launch this campaign to start detecting the sophisticated techniques leveraged by this threat group.

4
H
20
m
Intermediate
2420
4
161
Campaign Outline

Magic Hound: Campaign Overview
In this brief course, you will be introduced to the Magic Hound Threat Actor Campaign.
Overview
In this brief course, you will be introduced to the Magic Hound Threat Actor Campaign.

Search Open Technical Databases: Scan Databases
Overview

Exploitation for Privilege Escalation
This hands-on lab covers the MITRE technique T1068 - Exploitation for Privilege Escalation. This technique involves an adversary exploiting a vulnerability with the objective of gaining higher privileges. Learners will practice simulating privilege escalation and using a SIEM to detect this attack.
Overview
This hands-on lab covers the MITRE technique T1068 - Exploitation for Privilege Escalation. This technique involves an adversary exploiting a vulnerability with the objective of gaining higher privileges. Learners will practice simulating privilege escalation and using a SIEM to detect this attack.

Ingress Tool Transfer
This hands-on lab provides a brief survey of the MITRE TTP T1105 technique. This technique involves using tools to transfer malicious files onto a target network and the techniques used to evade detection.
Overview
This hands-on lab provides a brief survey of the MITRE TTP T1105 technique. This technique involves using tools to transfer malicious files onto a target network and the techniques used to evade detection.

Exfiltration Over C2 Channel
This hands-on lab covers the Mitre TTP T1041- Exfiltration Over C2 channel, which involves exfiltrating data over a command and control (C2) channel. This technique is commonly used by threat actors to evade detection and exfiltrate sensitive information from compromised networks.
Overview
This hands-on lab covers the Mitre TTP T1041- Exfiltration Over C2 channel, which involves exfiltrating data over a command and control (C2) channel. This technique is commonly used by threat actors to evade detection and exfiltrate sensitive information from compromised networks.