Companies Home Search Profile

Post Exploitation: Pillaging and Data Exfiltration

Focused View

Rithwik Jayasimha

1:17:42

33 View
  • 01.Course Overview.mp4
    01:54
  • 02.So What Is Pillaging.mp4
    05:16
  • 03.What Do You Look for During Post Exploitation.mp4
    08:58
  • 04.Pillaging - The Manual Approach.mp4
    07:00
  • 05.Using Obtained Data for Further Privilege Escalation.mp4
    07:26
  • 06.Putting the Attack Together.mp4
    03:41
  • 07.Automating Tasks During Pillaging and Module Summary.mp4
    04:46
  • 08.Whats the Next Step in the Process.mp4
    04:50
  • 09.Avenues for Data Exfiltration and Data Loss Prevention Systems.mp4
    07:59
  • 10.Bypassing Data Loss Prevention Systems.mp4
    10:20
  • 11.Exfiltration through the Internet and Physical Vectors.mp4
    07:14
  • 12.The Three Step Process to Data Exfiltration.mp4
    04:20
  • 13.Course Summary.mp4
    03:58
  • Description


    The simplest stage in a penetration test is data exfiltration, or is it? With the advent of new types of attackers, testing this is more critical than ever before. In this course, you'll explore some of the processes involved in this stage.

    What You'll Learn?


      Safeguarding a network today requires a multiple stage approach, not only is it important to keep attackers out, but it is also important to keep data from leaving the network. This means that we need to begin looking at data exfiltration not just as a stage in the penetration test, but as a more comprehensive solution that requires more robust checks from the client to lock down. In this course, Post Exploitation: Pillaging and Data Exfiltration, you’ll gain the ability to evaluate the systems not just for the data that they may possess through pillaging, but also begin to look at each system as another step in a long chain that can be leveraged to exfiltration. First, you’ll explore pillaging, critically evaluating the value of the system with pre-determined parameters. Next, you’ll discover how to chain multiple attacks together to create the final path for data exfiltration, touching upon bypassing some modern protection mechanisms. Finally, you’ll learn how to ask yourself the questions that will enable you to create your own processes. When you’re finished with this course, you’ll have the skills and knowledge of pillaging and data exfiltration needed to create, build, and execute attacks upon networks in a manner that will enable you to create a report that has value to your clients.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Rithwik Jayasimha
    Rithwik Jayasimha
    Instructor's Courses
    Rithwik Jayasimha is an information security consultant and researcher. He loves making devices of all shapes and sizes perform tasks for which they were not originally intended. Rithwik loves a good challenge - hit him up with a crypto challenge anytime! He is experienced in both offensive as well as defensive security. He heads a small group of pen testers based out of Bangalore. Rithwik is highly passionate about teaching and wants more people to enter security - both as hobbyists and professionals. He also wants to change the stigma associated with hacking and infosec in general. He contributes regularly to open-source infosec projects.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 13
    • duration 1:17:42
    • level average
    • Release Date 2023/10/11