Security in Obscurity

Courses by Jeff Stein

Command and Control with PoshC2

Pluralsight, October 2020

PoshC2 is a powerful tool that uses PowerShell to control a victim system toward furthering red teaming objectives beyond exploitation throughout the remaining life of an engagement. In this course, Command and Control with PoshC2, you will cover how to utilize PoshC2 to execute privilege escalation in a red team environment. This course will give you the skills and understanding to harness PowerShell to further your red teaming objectives towards command and control of a victim system.


Initial Access with King Phisher

Pluralsight, October 2020

King Phisher is a feature-rich tool for coordinating and monitoring successful phishing campaigns to further red teaming objectives towards initial access. In this course, Initial Access with King Phisher, you will see how to utilize King Phisher to execute a phishing attack in a red team environment. This course will give you the skills and understanding to you will learn the skills and understanding to further your red teaming objectives towards initial access.


Credential Access with Cain & Abel

Pluralsight, July 2020

Cain & Abel is a versatile tool for the Windows operating system. In this course, Credential Access with Cain & Abel, you will gain the ability to access credential sets in a victim network with techniques ranging from manipulating network traffic to cracking passwords using brute force and cryptanalysis attacks. This course will give you the skills and understanding to further your red teaming objectives towards exploitation, credential access, and lateral movement.


Tags

Thoughts Scripts Published Works Courses