Course Outline
Chapter One: Introduction and Installation
Introduction and Installation
Chapter II: payload applications
Create and monitor generate payload
Office macro payload applications
https payload application
to collect basic information on the target
page linked to horse application
phishing page application
to send bulk e-mail phishing
Chapter 3: Application avoid killing
Use c # to avoid killing
using powershell avoid killing
using hanzoInjection free to kill
the use of veil to avoid killing
Chapter 4: intranet applications ***
Basic use beacon console
socks proxy application
cs to pass shell msf
information gathering
transverse ***
mention the right to operate
the Script Manager
Chapter V: c2 configuration and reporting
Detailed profiles c2
type of report generation and
Lessons Learned
Courses Address
https://edu.51cto.com/sd/a8a83
Course two-dimensional code
mind Mapping