Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
After getting access to few servers in the environment your job is to discovery sensitive information about the environment. In this course, you will learn discovery using Seatbelt.
In a red team engagement, after getting access to some servers, it is important that you enumerate sensitive information about the environment so you can move laterally and execute your red-team objectives. In this course, Discovery with Seatbelt, you'll learn how to utilize the Seatbelt tool to enumerate crucial information about the targets in a red team environment. First, you’ll explore the basics of discovery and how to compile and run the Seatbelt tool. Next, you'll see how to use Seatbelt to discover sensitive data of a local machine. Finally, you’ll learn how to collect information about remote targets using the Seatbelt tool. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques [Account Discovery (T1087), Security Software Discovery (T1518.001) and System Information Discovery (T1082)] using Seatbelt. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.
In a red team engagement, after getting access to some servers, it is important that you enumerate sensitive information about the environment so you can move laterally and execute your red-team objectives. In this course, Discovery with Seatbelt, you'll learn how to utilize the Seatbelt tool to enumerate crucial information about the targets in a red team environment. First, you’ll explore the basics of discovery and how to compile and run the Seatbelt tool. Next, you'll see how to use Seatbelt to discover sensitive data of a local machine. Finally, you’ll learn how to collect information about remote targets using the Seatbelt tool. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques [Account Discovery (T1087), Security Software Discovery (T1518.001) and System Information Discovery (T1082)] using Seatbelt. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.