Red Team Weaponizing Windows Shortcut (Lnk) File Hands-On
Published 1/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 239.82 MB | Duration: 0h 35m
Modern techniques to weaponizing windows shortcut (lnk) file for red team/penetration tester/ethical hacker
What you'll learn
Hack Windows 10 (64 bit)
Use of Meterpreter Shell
Malicious exe to lnk file conversion
Evading detection and prevention mechanism
Requirements
Basic Linux skills recommended
Basic PowerShell skills recommended
A Windows 10 or 11 computer (virtual machine or physical machine)
Description
Windows shortcut (LNK) files are a type of file that contain a reference to another file or program on a computer. They are commonly used to create shortcuts to frequently used programs or files on the desktop or in the Start menu.Cyber attackers and advanced persistent threat (APT) groups have been known to abuse LNK files as a means of gaining initial access to a system and spreading ransomware. One common technique is to send a malicious LNK file as an attachment in a phishing email. When the recipient clicks on the LNK file, it can execute a malicious script or program that installs the ransomware on the victim's computer.Another technique that cyber attackers have been known to use is to place a malicious LNK file on a network share or removable drive and trick the victim into clicking on it. This can allow the ransomware to spread to other computers on the network or to any computer that the removable drive is connected to.In addition to using LNK files to spread ransomware, cyber attackers may also use them to gain initial access to a system by exploiting vulnerabilities in the way that Windows processes LNK files. For example, they may create a LNK file that contains a malicious payload that is executed when the LNK file is opened, allowing the attacker to gain access to the victim's system.In this course you will learn how to exploit a Windows 10 64-bit system using the modern techniques of creating windows shortcut (lnk file). You will also learn how to use the meterpreter shell, how to abuse windows shortcut to gain reverse shell and bypassing all the antivirus listed on virus total and much more.
Overview
Section 1: Introduction
Lecture 1 Lab Environment Setup
Lecture 2 Manually Creating Malicious lnk file and reverse shell
Lecture 3 Evading Detection and Protection Mechanism using lnk file
Lecture 4 Capturing NTLM Details Using lnk file
Lecture 5 Converting Malicious exe to lnk file
Lecture 6 Colleting Artifacts from lnk file
Lecture 7 How lnk file used by threat actors
Beginner Ethical Hackers,Red Team,Security Researchers,Want to learn modern techniques to weaponizing windows shortcut lnk file
Homepage
https://www.udemy.com/course/red-team-weaponizing-windows-shortcut-lnk-file/
Download From 1DL
https://1dl.net/qvwakbpospja/imhof.Red.Team.Weaponizing.Windows.Shortcut.Lnk.File.HandsOn.rar
https://rapidgator.net/file/98b42c71fcf951c069f2654be2fc12a8/imhof.Red.Team.Weaponizing.Windows.Shortcut.Lnk.File.HandsOn.rar.html
https://uploadgig.com/file/download/8Dd6C02c138b486e/imhof.Red.Team.Weaponizing.Windows.Shortcut.Lnk.File.HandsOn.rar
https://nitroflare.com/view/4FC96AE6EE28483/imhof.Red.Team.Weaponizing.Windows.Shortcut.Lnk.File.HandsOn.rar
Please Help Me Click Connect Icon Below Here and Share News to Social Network | Thanks you !
In today's era of digital learning, access to high-quality educational resources has become more accessible than ever, with a plethora of platforms offering free download video courses in various disciplines. One of the most sought-after categories among learners is the skillshar free video editing course, which provides aspiring creators with the tools and techniques needed to master the art of video production. These courses cover everything from basic editing principles to advanced techniques, empowering individuals to unleash their creativity and produce professional-quality content.
Comments (0)
Users of Guests are not allowed to comment this publication.