-
Notifications
You must be signed in to change notification settings - Fork 2
/
cybersecurity-roadmaps.html
25 lines (25 loc) · 361 KB
/
cybersecurity-roadmaps.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta http-equiv="X-UA-Compatible" content="ie=edge">
<title>Markmap</title>
<style>
* {
margin: 0;
padding: 0;
}
#mindmap {
display: block;
width: 100vw;
height: 100vh;
}
</style>
<link rel="stylesheet" href="https://cdn.jsdelivr.net/npm/markmap-toolbar@0.17.0/dist/style.css">
</head>
<body>
<svg id="mindmap"></svg>
<script src="https://cdn.jsdelivr.net/npm/d3@7.8.5/dist/d3.min.js"></script><script src="https://cdn.jsdelivr.net/npm/markmap-view@0.17.0/dist/browser/index.js"></script><script src="https://cdn.jsdelivr.net/npm/markmap-toolbar@0.17.0/dist/index.js"></script><script>(()=>{setTimeout(()=>{const{markmap:O,mm:h}=window,M=new O.Toolbar;M.attach(h);const oe=M.render();oe.setAttribute("style","position:absolute;bottom:20px;right:20px"),document.body.append(oe)})})()</script><script>((i,L,f,r)=>{const w=i();window.mm=w.Markmap.create("svg#mindmap",(L||w.deriveOptions)(r),f)})(()=>window.markmap,null,{"content":"Cybersecurity Roadmaps","children":[{"content":"Offensive Security","children":[{"content":"Penetration Testing","children":[{"content":"\n<p data-lines=\"7,8\">Web</p>","children":[{"content":"\n<p data-lines=\"9,10\">Prerequisites</p>","children":[{"content":"\n<p data-lines=\"11,12\">Basics of Network</p>","children":[],"payload":{"lines":"11,13"}},{"content":"\n<p data-lines=\"13,14\">Basics of Linux</p>","children":[],"payload":{"lines":"13,15"}},{"content":"\n<p data-lines=\"15,16\">Basics of HTML and CSS</p>","children":[],"payload":{"lines":"15,17"}},{"content":"\n<p data-lines=\"17,18\">Basics of JavaScript and NodeJS</p>","children":[],"payload":{"lines":"17,19"}},{"content":"\n<p data-lines=\"19,20\">Basics of JSON and XML</p>","children":[],"payload":{"lines":"19,21"}},{"content":"\n<p data-lines=\"21,22\">Basics of SQL and NoSQL</p>","children":[],"payload":{"lines":"21,23"}},{"content":"\n<p data-lines=\"23,24\">Basics of PHP</p>","children":[],"payload":{"lines":"23,25"}},{"content":"\n<p data-lines=\"25,26\">Basics of Java</p>","children":[],"payload":{"lines":"25,27"}},{"content":"\n<p data-lines=\"27,28\">Basics of C-Sharp</p>","children":[],"payload":{"lines":"27,29"}},{"content":"\n<p data-lines=\"29,30\">Basics of ASP.NET</p>","children":[],"payload":{"lines":"29,31"}},{"content":"\n<p data-lines=\"31,32\">Professional Python</p>","children":[],"payload":{"lines":"31,33"}}],"payload":{"lines":"9,33"}},{"content":"\n<p data-lines=\"33,34\">Syllabus</p>","children":[{"content":"\n<p data-lines=\"35,36\">HTTP Fundamentals</p>","children":[{"content":"\n<p data-lines=\"37,38\">Hypertext Transfer Protocol</p>","children":[],"payload":{"lines":"37,39"}},{"content":"\n<p data-lines=\"39,40\">Methodologies</p>","children":[],"payload":{"lines":"39,41"}},{"content":"\n<p data-lines=\"41,42\">Burp Suite</p>","children":[],"payload":{"lines":"41,43"}}],"payload":{"lines":"35,43"}},{"content":"\n<p data-lines=\"43,44\">Web Frameworks</p>","children":[{"content":"\n<p data-lines=\"45,46\">Content Management System</p>","children":[],"payload":{"lines":"45,47"}},{"content":"\n<p data-lines=\"47,48\">MS Exchange</p>","children":[],"payload":{"lines":"47,49"}},{"content":"\n<p data-lines=\"49,50\">Web Access Outlook</p>","children":[],"payload":{"lines":"49,51"}},{"content":"\n<p data-lines=\"51,52\">Web Architectures</p>","children":[],"payload":{"lines":"51,53"}},{"content":"\n<p data-lines=\"53,54\">Web App Technologies</p>","children":[],"payload":{"lines":"53,55"}},{"content":"\n<p data-lines=\"55,56\">Languages and Frameworks</p>","children":[],"payload":{"lines":"55,57"}},{"content":"\n<p data-lines=\"57,58\">Web Design Patterns</p>","children":[],"payload":{"lines":"57,59"}},{"content":"\n<p data-lines=\"59,60\">Browser Extensions</p>","children":[],"payload":{"lines":"59,61"}},{"content":"\n<p data-lines=\"61,62\">Data Formats</p>","children":[],"payload":{"lines":"61,63"}},{"content":"\n<p data-lines=\"63,64\">REST and SOAP</p>","children":[],"payload":{"lines":"63,65"}},{"content":"\n<p data-lines=\"65,66\">Java and Struts</p>","children":[],"payload":{"lines":"65,67"}},{"content":"\n<p data-lines=\"67,68\">Encoding Schemes</p>","children":[],"payload":{"lines":"67,69"}}],"payload":{"lines":"43,69"}},{"content":"\n<p data-lines=\"69,70\">Reconnaissance</p>","children":[{"content":"\n<p data-lines=\"71,72\">Search Engine Discovery</p>","children":[],"payload":{"lines":"71,73"}},{"content":"\n<p data-lines=\"73,74\">Fingerprint Web Server</p>","children":[],"payload":{"lines":"73,75"}},{"content":"\n<p data-lines=\"75,76\">Review Webserver Metafiles</p>","children":[],"payload":{"lines":"75,77"}},{"content":"\n<p data-lines=\"77,78\">Enumerate Applications</p>","children":[],"payload":{"lines":"77,79"}},{"content":"\n<p data-lines=\"79,80\">Review Webpage Content</p>","children":[],"payload":{"lines":"79,81"}},{"content":"\n<p data-lines=\"81,82\">Identify Application Entry Points</p>","children":[],"payload":{"lines":"81,83"}},{"content":"\n<p data-lines=\"83,84\">Map Execution Paths</p>","children":[],"payload":{"lines":"83,85"}},{"content":"\n<p data-lines=\"85,86\">Fingerprint Web Application Framework</p>","children":[],"payload":{"lines":"85,87"}},{"content":"\n<p data-lines=\"87,88\">Map Application Architecture</p>","children":[],"payload":{"lines":"87,89"}}],"payload":{"lines":"69,89"}},{"content":"\n<p data-lines=\"89,90\">Open Source Intelligence</p>","children":[{"content":"\n<p data-lines=\"91,92\">People Investigation</p>","children":[],"payload":{"lines":"91,93"}},{"content":"\n<p data-lines=\"93,94\">Infrastructure</p>","children":[],"payload":{"lines":"93,95"}}],"payload":{"lines":"89,95"}},{"content":"\n<p data-lines=\"95,96\">Misconfiguration</p>","children":[{"content":"\n<p data-lines=\"97,98\">Network Configuration</p>","children":[],"payload":{"lines":"97,99"}},{"content":"\n<p data-lines=\"99,100\">App Platform Configuration</p>","children":[],"payload":{"lines":"99,101"}},{"content":"\n<p data-lines=\"101,102\">File Extensions Handling</p>","children":[],"payload":{"lines":"101,103"}},{"content":"\n<p data-lines=\"103,104\">Review Old Backup</p>","children":[],"payload":{"lines":"103,105"}},{"content":"\n<p data-lines=\"105,106\">Enumerate Admin Interfaces</p>","children":[],"payload":{"lines":"105,107"}},{"content":"\n<p data-lines=\"107,108\">HTTP Methods</p>","children":[],"payload":{"lines":"107,109"}},{"content":"\n<p data-lines=\"109,110\">HTTP Strict Transport Security</p>","children":[],"payload":{"lines":"109,111"}},{"content":"\n<p data-lines=\"111,112\">RIA Cross Domain Policy</p>","children":[],"payload":{"lines":"111,113"}},{"content":"\n<p data-lines=\"113,114\">File Permission</p>","children":[],"payload":{"lines":"113,115"}},{"content":"\n<p data-lines=\"115,116\">Subdomain Takeover</p>","children":[],"payload":{"lines":"115,117"}},{"content":"\n<p data-lines=\"117,118\">Cloud Storage</p>","children":[],"payload":{"lines":"117,119"}},{"content":"\n<p data-lines=\"119,120\">Content Security Policy</p>","children":[],"payload":{"lines":"119,121"}},{"content":"\n<p data-lines=\"121,122\">Path Confusion</p>","children":[],"payload":{"lines":"121,123"}}],"payload":{"lines":"95,123"}},{"content":"\n<p data-lines=\"123,124\">Identity Management</p>","children":[{"content":"\n<p data-lines=\"125,126\">Role Definitions</p>","children":[],"payload":{"lines":"125,127"}},{"content":"\n<p data-lines=\"127,128\">User Registration</p>","children":[],"payload":{"lines":"127,129"}},{"content":"\n<p data-lines=\"129,130\">Account Provisioning</p>","children":[],"payload":{"lines":"129,131"}},{"content":"\n<p data-lines=\"131,132\">Account Enumeration</p>","children":[],"payload":{"lines":"131,133"}},{"content":"\n<p data-lines=\"133,134\">Weak Username Policy</p>","children":[],"payload":{"lines":"133,135"}}],"payload":{"lines":"123,135"}},{"content":"\n<p data-lines=\"135,136\">Broken Authentication</p>","children":[{"content":"\n<p data-lines=\"137,138\">Credentials Encrypted Channel</p>","children":[],"payload":{"lines":"137,139"}},{"content":"\n<p data-lines=\"139,140\">Default Credentials</p>","children":[],"payload":{"lines":"139,141"}},{"content":"\n<p data-lines=\"141,142\">Weak Lock Out Mechanism</p>","children":[],"payload":{"lines":"141,143"}},{"content":"\n<p data-lines=\"143,144\">Bypassing Authentication Schema</p>","children":[],"payload":{"lines":"143,145"}},{"content":"\n<p data-lines=\"145,146\">Vulnerable Remember Password</p>","children":[],"payload":{"lines":"145,147"}},{"content":"\n<p data-lines=\"147,148\">Browser Cache Weaknesses</p>","children":[],"payload":{"lines":"147,149"}},{"content":"\n<p data-lines=\"149,150\">Weak Password Policy</p>","children":[],"payload":{"lines":"149,151"}},{"content":"\n<p data-lines=\"151,152\">Weak Security Question Answer</p>","children":[],"payload":{"lines":"151,153"}},{"content":"\n<p data-lines=\"153,154\">Weak Password Reset Functionalities</p>","children":[],"payload":{"lines":"153,155"}},{"content":"\n<p data-lines=\"155,156\">Weaker Authentication in Alternative Channel</p>","children":[],"payload":{"lines":"155,157"}},{"content":"\n<p data-lines=\"157,158\">Multi-Factor Authentication</p>","children":[],"payload":{"lines":"157,159"}}],"payload":{"lines":"135,159"}},{"content":"\n<p data-lines=\"159,160\">Broken Authorization</p>","children":[{"content":"\n<p data-lines=\"161,162\">Directory Traversal File Include</p>","children":[],"payload":{"lines":"161,163"}},{"content":"\n<p data-lines=\"163,164\">Bypassing Authorization Schema</p>","children":[],"payload":{"lines":"163,165"}},{"content":"\n<p data-lines=\"165,166\">Privilege Escalation</p>","children":[],"payload":{"lines":"165,167"}},{"content":"\n<p data-lines=\"167,168\">Insecure Direct Object References</p>","children":[],"payload":{"lines":"167,169"}},{"content":"\n<p data-lines=\"169,170\">OAuth Weaknesses</p>","children":[],"payload":{"lines":"169,171"}}],"payload":{"lines":"159,171"}},{"content":"\n<p data-lines=\"171,172\">Session Management</p>","children":[{"content":"\n<p data-lines=\"173,174\">Session Management Schema</p>","children":[],"payload":{"lines":"173,175"}},{"content":"\n<p data-lines=\"175,176\">Cookies Attributes</p>","children":[],"payload":{"lines":"175,177"}},{"content":"\n<p data-lines=\"177,178\">Session Fixation</p>","children":[],"payload":{"lines":"177,179"}},{"content":"\n<p data-lines=\"179,180\">Exposed Session Variables</p>","children":[],"payload":{"lines":"179,181"}},{"content":"\n<p data-lines=\"181,182\">Cross Site Request Forgery</p>","children":[],"payload":{"lines":"181,183"}},{"content":"\n<p data-lines=\"183,184\">Logout Functionality</p>","children":[],"payload":{"lines":"183,185"}},{"content":"\n<p data-lines=\"185,186\">Session Timeout</p>","children":[],"payload":{"lines":"185,187"}},{"content":"\n<p data-lines=\"187,188\">Session Puzzling</p>","children":[],"payload":{"lines":"187,189"}},{"content":"\n<p data-lines=\"189,190\">Session Hijacking</p>","children":[],"payload":{"lines":"189,191"}},{"content":"\n<p data-lines=\"191,192\">JSON Web Tokens</p>","children":[],"payload":{"lines":"191,193"}}],"payload":{"lines":"171,193"}},{"content":"\n<p data-lines=\"193,194\">Input Validation</p>","children":[{"content":"\n<p data-lines=\"195,196\">Reflected Cross Site Scripting</p>","children":[],"payload":{"lines":"195,197"}},{"content":"\n<p data-lines=\"197,198\">Stored Cross Site Scripting</p>","children":[],"payload":{"lines":"197,199"}},{"content":"\n<p data-lines=\"199,200\">HTTP Verb Tampering</p>","children":[],"payload":{"lines":"199,201"}},{"content":"\n<p data-lines=\"201,202\">HTTP Parameter Pollution</p>","children":[],"payload":{"lines":"201,203"}},{"content":"\n<p data-lines=\"203,204\">SQL Injection</p>","children":[],"payload":{"lines":"203,205"}},{"content":"\n<p data-lines=\"205,206\">LDAP Injection</p>","children":[],"payload":{"lines":"205,207"}},{"content":"\n<p data-lines=\"207,208\">XML Injection</p>","children":[],"payload":{"lines":"207,209"}},{"content":"\n<p data-lines=\"209,210\">SSI Injection</p>","children":[],"payload":{"lines":"209,211"}},{"content":"\n<p data-lines=\"211,212\">XPath Injection</p>","children":[],"payload":{"lines":"211,213"}},{"content":"\n<p data-lines=\"213,214\">IMAP SMTP Injection</p>","children":[],"payload":{"lines":"213,215"}},{"content":"\n<p data-lines=\"215,216\">Code Injection</p>","children":[],"payload":{"lines":"215,217"}},{"content":"\n<p data-lines=\"217,218\">Command Injection</p>","children":[],"payload":{"lines":"217,219"}},{"content":"\n<p data-lines=\"219,220\">Insecure Deserialization</p>","children":[],"payload":{"lines":"219,221"}},{"content":"\n<p data-lines=\"221,222\">Format String Injection</p>","children":[],"payload":{"lines":"221,223"}},{"content":"\n<p data-lines=\"223,224\">Incubated Vulnerability</p>","children":[],"payload":{"lines":"223,225"}},{"content":"\n<p data-lines=\"225,226\">HTTP Splitting Smuggling</p>","children":[],"payload":{"lines":"225,227"}},{"content":"\n<p data-lines=\"227,228\">HTTP Incoming Requests</p>","children":[],"payload":{"lines":"227,229"}},{"content":"\n<p data-lines=\"229,230\">Host Header Injection</p>","children":[],"payload":{"lines":"229,231"}},{"content":"\n<p data-lines=\"231,232\">Server Side Template Injection</p>","children":[],"payload":{"lines":"231,233"}},{"content":"\n<p data-lines=\"233,234\">Server Side Request Forgery</p>","children":[],"payload":{"lines":"233,235"}},{"content":"\n<p data-lines=\"235,236\">Mass Assignment</p>","children":[],"payload":{"lines":"235,237"}},{"content":"\n<p data-lines=\"237,238\">Regular Expression DoS</p>","children":[],"payload":{"lines":"237,239"}},{"content":"\n<p data-lines=\"239,240\">PHP Type Juggling</p>","children":[],"payload":{"lines":"239,241"}}],"payload":{"lines":"193,241"}},{"content":"\n<p data-lines=\"241,242\">Error Handling</p>","children":[{"content":"\n<p data-lines=\"243,244\">Improper Error Handling</p>","children":[],"payload":{"lines":"243,245"}},{"content":"\n<p data-lines=\"245,246\">Stack Traces</p>","children":[],"payload":{"lines":"245,247"}}],"payload":{"lines":"241,247"}},{"content":"\n<p data-lines=\"247,248\">Weak Cryptography</p>","children":[{"content":"\n<p data-lines=\"249,250\">Weak Transport Layer Security</p>","children":[],"payload":{"lines":"249,251"}},{"content":"\n<p data-lines=\"251,252\">Padding Oracle Attack</p>","children":[],"payload":{"lines":"251,253"}},{"content":"\n<p data-lines=\"253,254\">Information Unencrypted Channel</p>","children":[],"payload":{"lines":"253,255"}},{"content":"\n<p data-lines=\"255,256\">Weak Encryption</p>","children":[],"payload":{"lines":"255,257"}}],"payload":{"lines":"247,257"}},{"content":"\n<p data-lines=\"257,258\">Business Logic</p>","children":[{"content":"\n<p data-lines=\"259,260\">Logic Data Validation</p>","children":[],"payload":{"lines":"259,261"}},{"content":"\n<p data-lines=\"261,262\">Ability to Forge Requests</p>","children":[],"payload":{"lines":"261,263"}},{"content":"\n<p data-lines=\"263,264\">Integrity Checks</p>","children":[],"payload":{"lines":"263,265"}},{"content":"\n<p data-lines=\"265,266\">Process Timing</p>","children":[],"payload":{"lines":"265,267"}},{"content":"\n<p data-lines=\"267,268\">Race Conditions</p>","children":[],"payload":{"lines":"267,269"}},{"content":"\n<p data-lines=\"269,270\">Circumvention of Work Flows</p>","children":[],"payload":{"lines":"269,271"}},{"content":"\n<p data-lines=\"271,272\">Defenses Against Application Misuse</p>","children":[],"payload":{"lines":"271,273"}},{"content":"\n<p data-lines=\"273,274\">Upload of Unexpected File Types</p>","children":[],"payload":{"lines":"273,275"}},{"content":"\n<p data-lines=\"275,276\">Upload of Malicious Files</p>","children":[],"payload":{"lines":"275,277"}},{"content":"\n<p data-lines=\"277,278\">Payment Functionality</p>","children":[],"payload":{"lines":"277,279"}}],"payload":{"lines":"257,279"}},{"content":"\n<p data-lines=\"279,280\">Client-side</p>","children":[{"content":"\n<p data-lines=\"281,282\">DOM-Based Cross Site Scripting</p>","children":[],"payload":{"lines":"281,283"}},{"content":"\n<p data-lines=\"283,284\">JavaScript Execution</p>","children":[],"payload":{"lines":"283,285"}},{"content":"\n<p data-lines=\"285,286\">HTML Injection</p>","children":[],"payload":{"lines":"285,287"}},{"content":"\n<p data-lines=\"287,288\">Client Side URL Redirect</p>","children":[],"payload":{"lines":"287,289"}},{"content":"\n<p data-lines=\"289,290\">CSS Injection</p>","children":[],"payload":{"lines":"289,291"}},{"content":"\n<p data-lines=\"291,292\">Client Side Resource Manipulation</p>","children":[],"payload":{"lines":"291,293"}},{"content":"\n<p data-lines=\"293,294\">Cross Origin Resource Sharing</p>","children":[],"payload":{"lines":"293,295"}},{"content":"\n<p data-lines=\"295,296\">Client Side Template Injection</p>","children":[],"payload":{"lines":"295,297"}},{"content":"\n<p data-lines=\"297,298\">Cross Site Flashing</p>","children":[],"payload":{"lines":"297,299"}},{"content":"\n<p data-lines=\"299,300\">Clickjacking</p>","children":[],"payload":{"lines":"299,301"}},{"content":"\n<p data-lines=\"301,302\">WebSockets</p>","children":[],"payload":{"lines":"301,303"}},{"content":"\n<p data-lines=\"303,304\">Web Messaging</p>","children":[],"payload":{"lines":"303,305"}},{"content":"\n<p data-lines=\"305,306\">Browser Storage</p>","children":[],"payload":{"lines":"305,307"}},{"content":"\n<p data-lines=\"307,308\">Cross Site Script Inclusion</p>","children":[],"payload":{"lines":"307,309"}},{"content":"\n<p data-lines=\"309,310\">Reverse Tabnabbing</p>","children":[],"payload":{"lines":"309,311"}}],"payload":{"lines":"279,311"}},{"content":"\n<p data-lines=\"311,312\">API Attacks</p>","children":[{"content":"\n<p data-lines=\"313,314\">Broken Object Level Authorization</p>","children":[],"payload":{"lines":"313,315"}},{"content":"\n<p data-lines=\"315,316\">Broken Authentication</p>","children":[],"payload":{"lines":"315,317"}},{"content":"\n<p data-lines=\"317,318\">Excessive Data Exposure</p>","children":[],"payload":{"lines":"317,319"}},{"content":"\n<p data-lines=\"319,320\">Lack of Resources and Rate Limiting</p>","children":[],"payload":{"lines":"319,321"}},{"content":"\n<p data-lines=\"321,322\">Broken Function Level Authorization</p>","children":[],"payload":{"lines":"321,323"}},{"content":"\n<p data-lines=\"323,324\">Mass Assignment</p>","children":[],"payload":{"lines":"323,325"}},{"content":"\n<p data-lines=\"325,326\">Security Misconfiguration</p>","children":[],"payload":{"lines":"325,327"}},{"content":"\n<p data-lines=\"327,328\">Injection Attack</p>","children":[],"payload":{"lines":"327,329"}},{"content":"\n<p data-lines=\"329,330\">Improper Assets Management</p>","children":[],"payload":{"lines":"329,331"}},{"content":"\n<p data-lines=\"331,332\">Insufficient Logging and Monitoring</p>","children":[],"payload":{"lines":"331,333"}}],"payload":{"lines":"311,333"}},{"content":"\n<p data-lines=\"333,334\">Smart Contract Attacks</p>","children":[{"content":"\n<p data-lines=\"335,336\">Reentrancy Attacks</p>","children":[],"payload":{"lines":"335,337"}},{"content":"\n<p data-lines=\"337,338\">Integer Overflow and Underflow</p>","children":[],"payload":{"lines":"337,339"}},{"content":"\n<p data-lines=\"339,340\">Timestamp Dependence</p>","children":[],"payload":{"lines":"339,341"}},{"content":"\n<p data-lines=\"341,342\">Access Control Vulnerabilities</p>","children":[],"payload":{"lines":"341,343"}},{"content":"\n<p data-lines=\"343,344\">Front-Running Attacks</p>","children":[],"payload":{"lines":"343,345"}},{"content":"\n<p data-lines=\"345,346\">Denial of Service (DoS) Attacks</p>","children":[],"payload":{"lines":"345,347"}},{"content":"\n<p data-lines=\"347,348\">Logic Errors</p>","children":[],"payload":{"lines":"347,349"}},{"content":"\n<p data-lines=\"349,350\">Insecure Randomness</p>","children":[],"payload":{"lines":"349,351"}},{"content":"\n<p data-lines=\"351,352\">Gas Limit Vulnerabilities</p>","children":[],"payload":{"lines":"351,353"}},{"content":"\n<p data-lines=\"353,354\">Unchecked External Calls</p>","children":[],"payload":{"lines":"353,355"}}],"payload":{"lines":"333,355"}}],"payload":{"lines":"33,355"}}],"payload":{"lines":"7,355"}},{"content":"\n<p data-lines=\"355,356\">Mobile</p>","children":[{"content":"\n<p data-lines=\"357,358\">Prerequisites</p>","children":[{"content":"\n<p data-lines=\"359,360\">Basics of Network</p>","children":[],"payload":{"lines":"359,361"}},{"content":"\n<p data-lines=\"361,362\">Basics of Linux</p>","children":[],"payload":{"lines":"361,363"}},{"content":"\n<p data-lines=\"363,364\">Basics of JSON and XML</p>","children":[],"payload":{"lines":"363,365"}},{"content":"\n<p data-lines=\"365,366\">Basics of Java</p>","children":[],"payload":{"lines":"365,367"}},{"content":"\n<p data-lines=\"367,368\">Basics of Kotlin</p>","children":[],"payload":{"lines":"367,369"}},{"content":"\n<p data-lines=\"369,370\">Basics of Swift</p>","children":[],"payload":{"lines":"369,371"}},{"content":"\n<p data-lines=\"371,372\">Basics of Smali</p>","children":[],"payload":{"lines":"371,373"}},{"content":"\n<p data-lines=\"373,374\">Professional Python</p>","children":[],"payload":{"lines":"373,375"}}],"payload":{"lines":"357,375"}},{"content":"\n<p data-lines=\"375,376\">Syllabus</p>","children":[{"content":"\n<p data-lines=\"377,378\">Mobile App Taxonomy</p>","children":[{"content":"\n<p data-lines=\"379,380\">Native App</p>","children":[],"payload":{"lines":"379,381"}},{"content":"\n<p data-lines=\"381,382\">Web App</p>","children":[],"payload":{"lines":"381,383"}},{"content":"\n<p data-lines=\"383,384\">Hybrid App</p>","children":[],"payload":{"lines":"383,385"}},{"content":"\n<p data-lines=\"385,386\">Progressive Web App</p>","children":[],"payload":{"lines":"385,387"}}],"payload":{"lines":"377,387"}},{"content":"\n<p data-lines=\"387,388\">Mobile App Security Testing</p>","children":[{"content":"\n<p data-lines=\"389,390\">Principles of Testing</p>","children":[],"payload":{"lines":"389,391"}},{"content":"\n<p data-lines=\"391,392\">Security Testing and the SDLC</p>","children":[],"payload":{"lines":"391,393"}}],"payload":{"lines":"387,393"}},{"content":"\n<p data-lines=\"393,394\">General</p>","children":[{"content":"\n<p data-lines=\"395,396\">Mobile App Authentication Architectures</p>","children":[{"content":"\n<p data-lines=\"397,398\">General Guidelines on Testing Authentication</p>","children":[],"payload":{"lines":"397,399"}},{"content":"\n<p data-lines=\"399,400\">Verifying that Appropriate Authentication is in Place</p>","children":[],"payload":{"lines":"399,401"}},{"content":"\n<p data-lines=\"401,402\">Best Practices for Passwords</p>","children":[],"payload":{"lines":"401,403"}},{"content":"\n<p data-lines=\"403,404\">Stateful Session Management</p>","children":[],"payload":{"lines":"403,405"}},{"content":"\n<p data-lines=\"405,406\">Session Timeout</p>","children":[],"payload":{"lines":"405,407"}},{"content":"\n<p data-lines=\"407,408\">User Logout</p>","children":[],"payload":{"lines":"407,409"}},{"content":"\n<p data-lines=\"409,410\">Two-Factor Authentication</p>","children":[],"payload":{"lines":"409,411"}},{"content":"\n<p data-lines=\"411,412\">Stateless (Token-Based) Authentication</p>","children":[],"payload":{"lines":"411,413"}},{"content":"\n<p data-lines=\"413,414\">OAuth 2.0 Flows</p>","children":[],"payload":{"lines":"413,415"}},{"content":"\n<p data-lines=\"415,416\">Login Activity and Device Blocking</p>","children":[],"payload":{"lines":"415,417"}}],"payload":{"lines":"395,417"}},{"content":"\n<p data-lines=\"417,418\">Testing Network Communication</p>","children":[{"content":"\n<p data-lines=\"419,420\">Intercepting HTTP(S) Traffic</p>","children":[],"payload":{"lines":"419,421"}},{"content":"\n<p data-lines=\"421,422\">Burp plugins to Process Non-HTTP Traffic</p>","children":[],"payload":{"lines":"421,423"}},{"content":"\n<p data-lines=\"423,424\">Intercepting Traffic on the Network Layer</p>","children":[],"payload":{"lines":"423,425"}},{"content":"\n<p data-lines=\"425,426\">Verifying Data Encryption on the Network</p>","children":[],"payload":{"lines":"425,427"}},{"content":"\n<p data-lines=\"427,428\">Use Secure Communication Channels</p>","children":[],"payload":{"lines":"427,429"}}],"payload":{"lines":"417,429"}},{"content":"\n<p data-lines=\"429,430\">Cryptography in Mobile Apps</p>","children":[{"content":"\n<p data-lines=\"431,432\">Key Concepts</p>","children":[],"payload":{"lines":"431,433"}},{"content":"\n<p data-lines=\"433,434\">Identifying Insecure Cryptographic Algorithms</p>","children":[],"payload":{"lines":"433,435"}},{"content":"\n<p data-lines=\"435,436\">Common Configuration Issues</p>","children":[],"payload":{"lines":"435,437"}},{"content":"\n<p data-lines=\"437,438\">Cryptographic APIs on Android and iOS</p>","children":[],"payload":{"lines":"437,439"}},{"content":"\n<p data-lines=\"439,440\">Cryptographic policy</p>","children":[],"payload":{"lines":"439,441"}}],"payload":{"lines":"429,441"}},{"content":"\n<p data-lines=\"441,442\">Testing Code Quality</p>","children":[{"content":"\n<p data-lines=\"443,444\">Injection Flaws</p>","children":[],"payload":{"lines":"443,445"}},{"content":"\n<p data-lines=\"445,446\">Cross-Site Scripting Flaws</p>","children":[],"payload":{"lines":"445,447"}},{"content":"\n<p data-lines=\"447,448\">Memory Corruption Bugs</p>","children":[],"payload":{"lines":"447,449"}}],"payload":{"lines":"441,449"}},{"content":"\n<p data-lines=\"449,450\">Tampering and Reverse Engineering</p>","children":[{"content":"\n<p data-lines=\"451,452\">Reverse Engineering</p>","children":[],"payload":{"lines":"451,453"}},{"content":"\n<p data-lines=\"453,454\">Static Analysis</p>","children":[],"payload":{"lines":"453,455"}},{"content":"\n<p data-lines=\"455,456\">Dynamic Analysis</p>","children":[],"payload":{"lines":"455,457"}},{"content":"\n<p data-lines=\"457,458\">Tampering and Runtime Instrumentation</p>","children":[],"payload":{"lines":"457,459"}},{"content":"\n<p data-lines=\"459,460\">Customizing Android for Reverse Engineering</p>","children":[],"payload":{"lines":"459,461"}}],"payload":{"lines":"449,461"}}],"payload":{"lines":"393,461"}},{"content":"\n<p data-lines=\"461,462\">Android</p>","children":[{"content":"\n<p data-lines=\"463,464\">Platform Overview</p>","children":[{"content":"\n<p data-lines=\"465,466\">Android Architecture</p>","children":[],"payload":{"lines":"465,467"}},{"content":"\n<p data-lines=\"467,468\">Android Security: Defense-in-Depth Approach</p>","children":[],"payload":{"lines":"467,469"}},{"content":"\n<p data-lines=\"469,470\">Android Application Structure</p>","children":[],"payload":{"lines":"469,471"}},{"content":"\n<p data-lines=\"471,472\">Android Application Publishing</p>","children":[],"payload":{"lines":"471,473"}},{"content":"\n<p data-lines=\"473,474\">Android Application Attack Surface</p>","children":[],"payload":{"lines":"473,475"}}],"payload":{"lines":"463,475"}},{"content":"\n<p data-lines=\"475,476\">Android Basic Security Testing</p>","children":[{"content":"\n<p data-lines=\"477,478\">Android Testing Setup</p>","children":[],"payload":{"lines":"477,479"}},{"content":"\n<p data-lines=\"479,480\">Basic Testing Operations</p>","children":[],"payload":{"lines":"479,481"}},{"content":"\n<p data-lines=\"481,482\">Setting up a Network Testing Environment</p>","children":[],"payload":{"lines":"481,483"}}],"payload":{"lines":"475,483"}},{"content":"\n<p data-lines=\"483,484\">Data Storage on Android</p>","children":[{"content":"\n<p data-lines=\"485,486\">Theory Overview</p>","children":[],"payload":{"lines":"485,487"}},{"content":"\n<p data-lines=\"487,488\">Data Storage Methods Overview</p>","children":[],"payload":{"lines":"487,489"}},{"content":"\n<p data-lines=\"489,490\">Local Storage for Sensitive Data</p>","children":[],"payload":{"lines":"489,491"}},{"content":"\n<p data-lines=\"491,492\">Local Storage for Input Validation</p>","children":[],"payload":{"lines":"491,493"}},{"content":"\n<p data-lines=\"493,494\">Logs for Sensitive Data</p>","children":[],"payload":{"lines":"493,495"}},{"content":"\n<p data-lines=\"495,496\">Sensitive Data is Sent to Third Parties</p>","children":[],"payload":{"lines":"495,497"}},{"content":"\n<p data-lines=\"497,498\">Keyboard Cache Is Disabled for Text Input Fields</p>","children":[],"payload":{"lines":"497,499"}},{"content":"\n<p data-lines=\"499,500\">Sensitive Stored Data Has Been Exposed via IPC Mechanisms</p>","children":[],"payload":{"lines":"499,501"}},{"content":"\n<p data-lines=\"501,502\">Sensitive Data Disclosure Through the User Interface</p>","children":[],"payload":{"lines":"501,503"}},{"content":"\n<p data-lines=\"503,504\">Backups for Sensitive Data</p>","children":[],"payload":{"lines":"503,505"}},{"content":"\n<p data-lines=\"505,506\">Sensitive Information in Auto-Generated Screenshots</p>","children":[],"payload":{"lines":"505,507"}},{"content":"\n<p data-lines=\"507,508\">Checking Memory for Sensitive Data</p>","children":[],"payload":{"lines":"507,509"}},{"content":"\n<p data-lines=\"509,510\">Device-Access-Security Policy</p>","children":[],"payload":{"lines":"509,511"}}],"payload":{"lines":"483,511"}},{"content":"\n<p data-lines=\"511,512\">Android Cryptographic APIs</p>","children":[{"content":"\n<p data-lines=\"513,514\">Recommendations</p>","children":[],"payload":{"lines":"513,515"}},{"content":"\n<p data-lines=\"515,516\">Symmetric Cryptography</p>","children":[],"payload":{"lines":"515,517"}},{"content":"\n<p data-lines=\"517,518\">Configuration of Cryptographic Standard Algorithms</p>","children":[],"payload":{"lines":"517,519"}},{"content":"\n<p data-lines=\"519,520\">Purposes of Keys</p>","children":[],"payload":{"lines":"519,521"}},{"content":"\n<p data-lines=\"521,522\">Random Number Generation</p>","children":[],"payload":{"lines":"521,523"}}],"payload":{"lines":"511,523"}},{"content":"\n<p data-lines=\"523,524\">Local Authentication on Android</p>","children":[{"content":"\n<p data-lines=\"525,526\">Confirm Credentials</p>","children":[],"payload":{"lines":"525,527"}},{"content":"\n<p data-lines=\"527,528\">Biometric Authentication</p>","children":[],"payload":{"lines":"527,529"}}],"payload":{"lines":"523,529"}},{"content":"\n<p data-lines=\"529,530\">Android Network APIs</p>","children":[{"content":"\n<p data-lines=\"531,532\">Endpoint Identify Verification</p>","children":[],"payload":{"lines":"531,533"}},{"content":"\n<p data-lines=\"533,534\">Custom Certificate Stores and Certificate Pinning</p>","children":[],"payload":{"lines":"533,535"}},{"content":"\n<p data-lines=\"535,536\">Network Security Configuration Settings</p>","children":[],"payload":{"lines":"535,537"}},{"content":"\n<p data-lines=\"537,538\">Security Provider</p>","children":[],"payload":{"lines":"537,539"}}],"payload":{"lines":"529,539"}},{"content":"\n<p data-lines=\"539,540\">Android Platform APIs</p>","children":[{"content":"\n<p data-lines=\"541,542\">App Permissions</p>","children":[],"payload":{"lines":"541,543"}},{"content":"\n<p data-lines=\"543,544\">Injection Flaws</p>","children":[],"payload":{"lines":"543,545"}},{"content":"\n<p data-lines=\"545,546\">Fragment Injection</p>","children":[],"payload":{"lines":"545,547"}},{"content":"\n<p data-lines=\"547,548\">URL Loading in WebViews</p>","children":[],"payload":{"lines":"547,549"}},{"content":"\n<p data-lines=\"549,550\">Custom URL Schemes</p>","children":[],"payload":{"lines":"549,551"}},{"content":"\n<p data-lines=\"551,552\">Insecure Configuration of Instant Apps</p>","children":[],"payload":{"lines":"551,553"}},{"content":"\n<p data-lines=\"553,554\">Sensitive Functionality Exposure Through IPC</p>","children":[],"payload":{"lines":"553,555"}},{"content":"\n<p data-lines=\"555,556\">JavaScript Execution in WebViews</p>","children":[],"payload":{"lines":"555,557"}},{"content":"\n<p data-lines=\"557,558\">WebView Protocol Handlers</p>","children":[],"payload":{"lines":"557,559"}},{"content":"\n<p data-lines=\"559,560\">Java Objects Are Exposed Through WebViews</p>","children":[],"payload":{"lines":"559,561"}}],"payload":{"lines":"539,561"}},{"content":"\n<p data-lines=\"561,562\">Code Quality and Build Settings for Android Apps</p>","children":[{"content":"\n<p data-lines=\"563,564\">Making Sure That the App is Properly Signed</p>","children":[],"payload":{"lines":"563,565"}},{"content":"\n<p data-lines=\"565,566\">App is Debuggable</p>","children":[],"payload":{"lines":"565,567"}},{"content":"\n<p data-lines=\"567,568\">Debugging Symbols</p>","children":[],"payload":{"lines":"567,569"}},{"content":"\n<p data-lines=\"569,570\">Debugging Code and Verbose Error Logging</p>","children":[],"payload":{"lines":"569,571"}},{"content":"\n<p data-lines=\"571,572\">Weaknesses in Third Party Libraries</p>","children":[],"payload":{"lines":"571,573"}},{"content":"\n<p data-lines=\"573,574\">Exception Handling</p>","children":[],"payload":{"lines":"573,575"}},{"content":"\n<p data-lines=\"575,576\">Memory Corruption Bugs</p>","children":[],"payload":{"lines":"575,577"}},{"content":"\n<p data-lines=\"577,578\">Make Sure That Free Security Features Are Activated</p>","children":[],"payload":{"lines":"577,579"}}],"payload":{"lines":"561,579"}},{"content":"\n<p data-lines=\"579,580\">Tampering and Reverse Engineering on Android</p>","children":[{"content":"\n<p data-lines=\"581,582\">Reverse Engineering</p>","children":[],"payload":{"lines":"581,583"}},{"content":"\n<p data-lines=\"583,584\">Static Analysis</p>","children":[],"payload":{"lines":"583,585"}},{"content":"\n<p data-lines=\"585,586\">Dynamic Analysis</p>","children":[],"payload":{"lines":"585,587"}},{"content":"\n<p data-lines=\"587,588\">Tampering and Runtime Instrumentation</p>","children":[],"payload":{"lines":"587,589"}},{"content":"\n<p data-lines=\"589,590\">Customizing Android for Reverse Engineering</p>","children":[],"payload":{"lines":"589,591"}}],"payload":{"lines":"579,591"}},{"content":"\n<p data-lines=\"591,592\">Android Anti-Reversing Defenses</p>","children":[{"content":"\n<p data-lines=\"593,594\">Root Detection</p>","children":[],"payload":{"lines":"593,595"}},{"content":"\n<p data-lines=\"595,596\">Anti-Debugging Detection</p>","children":[],"payload":{"lines":"595,597"}},{"content":"\n<p data-lines=\"597,598\">File Integrity Checks</p>","children":[],"payload":{"lines":"597,599"}},{"content":"\n<p data-lines=\"599,600\">Reverse Engineering Tools Detection</p>","children":[],"payload":{"lines":"599,601"}},{"content":"\n<p data-lines=\"601,602\">Emulator Detection</p>","children":[],"payload":{"lines":"601,603"}},{"content":"\n<p data-lines=\"603,604\">Runtime Integrity Checks</p>","children":[],"payload":{"lines":"603,605"}},{"content":"\n<p data-lines=\"605,606\">Obfuscation</p>","children":[],"payload":{"lines":"605,607"}},{"content":"\n<p data-lines=\"607,608\">Device Binding</p>","children":[],"payload":{"lines":"607,609"}}],"payload":{"lines":"591,609"}}],"payload":{"lines":"461,609"}},{"content":"\n<p data-lines=\"609,610\">iOS</p>","children":[{"content":"\n<p data-lines=\"611,612\">Platform Overview</p>","children":[{"content":"\n<p data-lines=\"613,614\">iOS Security Architecture</p>","children":[],"payload":{"lines":"613,615"}},{"content":"\n<p data-lines=\"615,616\">Software Development on iOS</p>","children":[],"payload":{"lines":"615,617"}},{"content":"\n<p data-lines=\"617,618\">Apps on iOS</p>","children":[],"payload":{"lines":"617,619"}}],"payload":{"lines":"611,619"}},{"content":"\n<p data-lines=\"619,620\">iOS Basic Security Testing</p>","children":[{"content":"\n<p data-lines=\"621,622\">iOS Testing Setup</p>","children":[],"payload":{"lines":"621,623"}},{"content":"\n<p data-lines=\"623,624\">Basic Testing Operations</p>","children":[],"payload":{"lines":"623,625"}},{"content":"\n<p data-lines=\"625,626\">Setting Up a Network Testing Environment</p>","children":[],"payload":{"lines":"625,627"}}],"payload":{"lines":"619,627"}},{"content":"\n<p data-lines=\"627,628\">Data Storage on iOS</p>","children":[{"content":"\n<p data-lines=\"629,630\">Local Data Storage</p>","children":[],"payload":{"lines":"629,631"}},{"content":"\n<p data-lines=\"631,632\">Logs for Sensitive Data</p>","children":[],"payload":{"lines":"631,633"}},{"content":"\n<p data-lines=\"633,634\">Sensitive Data Is Sent to Third Parties</p>","children":[],"payload":{"lines":"633,635"}},{"content":"\n<p data-lines=\"635,636\">Sensitive Data in the Keyboard Cache</p>","children":[],"payload":{"lines":"635,637"}},{"content":"\n<p data-lines=\"637,638\">Sensitive Data Is Exposed via IPC Mechanisms</p>","children":[],"payload":{"lines":"637,639"}},{"content":"\n<p data-lines=\"639,640\">Sensitive Data Disclosed Through the User Interface</p>","children":[],"payload":{"lines":"639,641"}},{"content":"\n<p data-lines=\"641,642\">Backups for Sensitive Data</p>","children":[],"payload":{"lines":"641,643"}},{"content":"\n<p data-lines=\"643,644\">Auto-Generated Screenshots for Sensitive Information</p>","children":[],"payload":{"lines":"643,645"}},{"content":"\n<p data-lines=\"645,646\">Memory for Sensitive Data</p>","children":[],"payload":{"lines":"645,647"}}],"payload":{"lines":"627,647"}},{"content":"\n<p data-lines=\"647,648\">iOS Cryptographic APIs</p>","children":[{"content":"\n<p data-lines=\"649,650\">Configuration of Cryptographic Standard Algorithms</p>","children":[],"payload":{"lines":"649,651"}},{"content":"\n<p data-lines=\"651,652\">Key Management</p>","children":[],"payload":{"lines":"651,653"}},{"content":"\n<p data-lines=\"653,654\">Random Number Generation</p>","children":[],"payload":{"lines":"653,655"}}],"payload":{"lines":"647,655"}},{"content":"\n<p data-lines=\"655,656\">Local Authentication on iOS</p>","children":[{"content":"\n<p data-lines=\"657,658\">Local Authentication</p>","children":[],"payload":{"lines":"657,659"}},{"content":"\n<p data-lines=\"659,660\">Note regarding temporariness of keys in the Keychain</p>","children":[],"payload":{"lines":"659,661"}}],"payload":{"lines":"655,661"}},{"content":"\n<p data-lines=\"661,662\">iOS Network APIs</p>","children":[{"content":"\n<p data-lines=\"663,664\">Network Framework</p>","children":[],"payload":{"lines":"663,665"}},{"content":"\n<p data-lines=\"665,666\">URLSession</p>","children":[],"payload":{"lines":"665,667"}},{"content":"\n<p data-lines=\"667,668\">App Transport Security</p>","children":[],"payload":{"lines":"667,669"}},{"content":"\n<p data-lines=\"669,670\">Custom Certificate Stores and Certificate Pinning</p>","children":[],"payload":{"lines":"669,671"}}],"payload":{"lines":"661,671"}},{"content":"\n<p data-lines=\"671,672\">iOS Platform APIs</p>","children":[{"content":"\n<p data-lines=\"673,674\">App Permissions</p>","children":[],"payload":{"lines":"673,675"}},{"content":"\n<p data-lines=\"675,676\">Sensitive Functionality Exposure Through IPC</p>","children":[],"payload":{"lines":"675,677"}},{"content":"\n<p data-lines=\"677,678\">Custom URL Schemes</p>","children":[],"payload":{"lines":"677,679"}},{"content":"\n<p data-lines=\"679,680\">iOS WebViews</p>","children":[],"payload":{"lines":"679,681"}},{"content":"\n<p data-lines=\"681,682\">WebView Protocol Handlers</p>","children":[],"payload":{"lines":"681,683"}},{"content":"\n<p data-lines=\"683,684\">Native Methods Are Exposed Through WebViews</p>","children":[],"payload":{"lines":"683,685"}},{"content":"\n<p data-lines=\"685,686\">Object Persistence</p>","children":[],"payload":{"lines":"685,687"}},{"content":"\n<p data-lines=\"687,688\">Enforced Updating</p>","children":[],"payload":{"lines":"687,689"}}],"payload":{"lines":"671,689"}},{"content":"\n<p data-lines=\"689,690\">Code Quality and Build Settings for iOS Apps</p>","children":[{"content":"\n<p data-lines=\"691,692\">Making Sure that the App Is Properly Signed</p>","children":[],"payload":{"lines":"691,693"}},{"content":"\n<p data-lines=\"693,694\">App is Debuggable</p>","children":[],"payload":{"lines":"693,695"}},{"content":"\n<p data-lines=\"695,696\">Debugging Symbols</p>","children":[],"payload":{"lines":"695,697"}},{"content":"\n<p data-lines=\"697,698\">Debugging Code and Verbose Error Logging</p>","children":[],"payload":{"lines":"697,699"}},{"content":"\n<p data-lines=\"699,700\">Weaknesses in Third Party Libraries</p>","children":[],"payload":{"lines":"699,701"}},{"content":"\n<p data-lines=\"701,702\">Exception Handling</p>","children":[],"payload":{"lines":"701,703"}},{"content":"\n<p data-lines=\"703,704\">Memory Corruption Bugs</p>","children":[],"payload":{"lines":"703,705"}},{"content":"\n<p data-lines=\"705,706\">Make Sure That Free Security Features Are Activated</p>","children":[],"payload":{"lines":"705,707"}}],"payload":{"lines":"689,707"}},{"content":"\n<p data-lines=\"707,708\">Tampering and Reverse Engineering on iOS</p>","children":[{"content":"\n<p data-lines=\"709,710\">Reverse Engineering</p>","children":[],"payload":{"lines":"709,711"}},{"content":"\n<p data-lines=\"711,712\">Static Analysis</p>","children":[],"payload":{"lines":"711,713"}},{"content":"\n<p data-lines=\"713,714\">Dynamic Analysis</p>","children":[],"payload":{"lines":"713,715"}},{"content":"\n<p data-lines=\"715,716\">Binary Analysis</p>","children":[],"payload":{"lines":"715,717"}},{"content":"\n<p data-lines=\"717,718\">Tampering and Runtime Instrumentation</p>","children":[],"payload":{"lines":"717,719"}}],"payload":{"lines":"707,719"}},{"content":"\n<p data-lines=\"719,720\">iOS Anti-Reversing Defenses</p>","children":[{"content":"\n<p data-lines=\"721,722\">Jailbreak Detection</p>","children":[],"payload":{"lines":"721,723"}},{"content":"\n<p data-lines=\"723,724\">Anti-Debugging Detection</p>","children":[],"payload":{"lines":"723,725"}},{"content":"\n<p data-lines=\"725,726\">File Integrity Checks</p>","children":[],"payload":{"lines":"725,727"}},{"content":"\n<p data-lines=\"727,728\">Reverse Engineering Tools Detection</p>","children":[],"payload":{"lines":"727,729"}},{"content":"\n<p data-lines=\"729,730\">Emulator Detection</p>","children":[],"payload":{"lines":"729,731"}},{"content":"\n<p data-lines=\"731,732\">Obfuscation</p>","children":[],"payload":{"lines":"731,733"}},{"content":"\n<p data-lines=\"733,734\">Device Binding</p>","children":[],"payload":{"lines":"733,735"}}],"payload":{"lines":"719,735"}}],"payload":{"lines":"609,735"}}],"payload":{"lines":"375,735"}}],"payload":{"lines":"355,735"}},{"content":"\n<p data-lines=\"735,736\">Cloud</p>","children":[{"content":"\n<p data-lines=\"737,738\">Prerequisites</p>","children":[{"content":"\n<p data-lines=\"739,740\">Basics of Network</p>","children":[],"payload":{"lines":"739,741"}},{"content":"\n<p data-lines=\"741,742\">Basics of Linux</p>","children":[],"payload":{"lines":"741,743"}},{"content":"\n<p data-lines=\"743,744\">Basics of HTML and CSS</p>","children":[],"payload":{"lines":"743,745"}},{"content":"\n<p data-lines=\"745,746\">Basics of JavaScript and NodeJS</p>","children":[],"payload":{"lines":"745,747"}},{"content":"\n<p data-lines=\"747,748\">Basics of JSON and XML</p>","children":[],"payload":{"lines":"747,749"}},{"content":"\n<p data-lines=\"749,750\">Basics of SQL and NoSQL</p>","children":[],"payload":{"lines":"749,751"}},{"content":"\n<p data-lines=\"751,752\">Basics of PHP</p>","children":[],"payload":{"lines":"751,753"}},{"content":"\n<p data-lines=\"753,754\">Basics of Java</p>","children":[],"payload":{"lines":"753,755"}},{"content":"\n<p data-lines=\"755,756\">Basics of C-Sharp</p>","children":[],"payload":{"lines":"755,757"}},{"content":"\n<p data-lines=\"757,758\">Basics of ASP.NET</p>","children":[],"payload":{"lines":"757,759"}},{"content":"\n<p data-lines=\"759,760\">Professional Python</p>","children":[],"payload":{"lines":"759,761"}}],"payload":{"lines":"737,761"}},{"content":"\n<p data-lines=\"761,762\">Syllabus</p>","children":[{"content":"\n<p data-lines=\"763,764\">Reconnaissance</p>","children":[{"content":"\n<p data-lines=\"765,766\">Search Engine Discovery</p>","children":[],"payload":{"lines":"765,767"}},{"content":"\n<p data-lines=\"767,768\">Fingerprint Web Server</p>","children":[],"payload":{"lines":"767,769"}},{"content":"\n<p data-lines=\"769,770\">Review Webserver Metafiles</p>","children":[],"payload":{"lines":"769,771"}},{"content":"\n<p data-lines=\"771,772\">Enumerate Applications</p>","children":[],"payload":{"lines":"771,773"}},{"content":"\n<p data-lines=\"773,774\">Review Webpage Content</p>","children":[],"payload":{"lines":"773,775"}},{"content":"\n<p data-lines=\"775,776\">Identify Application Entry Points</p>","children":[],"payload":{"lines":"775,777"}},{"content":"\n<p data-lines=\"777,778\">Map Execution Paths</p>","children":[],"payload":{"lines":"777,779"}},{"content":"\n<p data-lines=\"779,780\">Fingerprint Web Application Framework</p>","children":[],"payload":{"lines":"779,781"}},{"content":"\n<p data-lines=\"781,782\">Map Application Architecture</p>","children":[],"payload":{"lines":"781,783"}}],"payload":{"lines":"763,783"}},{"content":"\n<p data-lines=\"783,784\">SaaS</p>","children":[{"content":"\n<p data-lines=\"785,786\">Deployment Pipelines and Attacks</p>","children":[],"payload":{"lines":"785,787"}},{"content":"\n<p data-lines=\"787,788\">Web Application Injections</p>","children":[],"payload":{"lines":"787,789"}},{"content":"\n<p data-lines=\"789,790\">Server-Side Request Forgeries and Their Impacts</p>","children":[],"payload":{"lines":"789,791"}},{"content":"\n<p data-lines=\"791,792\">Command Line Injections</p>","children":[],"payload":{"lines":"791,793"}},{"content":"\n<p data-lines=\"793,794\">Serverless Functions Attacks</p>","children":[],"payload":{"lines":"793,795"}},{"content":"\n<p data-lines=\"795,796\">Exposed Databases and Ports</p>","children":[],"payload":{"lines":"795,797"}},{"content":"\n<p data-lines=\"797,798\">SQL Injections in Cloud Applications</p>","children":[],"payload":{"lines":"797,799"}}],"payload":{"lines":"783,799"}},{"content":"\n<p data-lines=\"799,800\">IaaS</p>","children":[{"content":"\n<p data-lines=\"801,802\">Username Harvesting</p>","children":[],"payload":{"lines":"801,803"}},{"content":"\n<p data-lines=\"803,804\">Open File Shares</p>","children":[],"payload":{"lines":"803,805"}},{"content":"\n<p data-lines=\"805,806\">Azure AD</p>","children":[],"payload":{"lines":"805,807"}},{"content":"\n<p data-lines=\"807,808\">Infrastructure as Code</p>","children":[],"payload":{"lines":"807,809"}},{"content":"\n<p data-lines=\"809,810\">Docker</p>","children":[],"payload":{"lines":"809,811"}},{"content":"\n<p data-lines=\"811,812\">Kubernetes</p>","children":[],"payload":{"lines":"811,813"}},{"content":"\n<p data-lines=\"813,814\">Cloud Native Applications and CI/CD Pipelines</p>","children":[],"payload":{"lines":"813,815"}},{"content":"\n<p data-lines=\"815,816\">Password Attacks on Cloud Environments</p>","children":[],"payload":{"lines":"815,817"}}],"payload":{"lines":"799,817"}},{"content":"\n<p data-lines=\"817,818\">Azure</p>","children":[{"content":"\n<p data-lines=\"819,820\">Basic Information</p>","children":[],"payload":{"lines":"819,821"}},{"content":"\n<p data-lines=\"821,822\">Unauthenticated Enum & Initial Entry</p>","children":[],"payload":{"lines":"821,823"}},{"content":"\n<p data-lines=\"823,824\">Services</p>","children":[],"payload":{"lines":"823,825"}},{"content":"\n<p data-lines=\"825,826\">Permissions for a Pentest</p>","children":[],"payload":{"lines":"825,827"}},{"content":"\n<p data-lines=\"827,828\">Lateral Movement (Cloud - On-Prem)</p>","children":[],"payload":{"lines":"827,829"}},{"content":"\n<p data-lines=\"829,830\">Persistence</p>","children":[],"payload":{"lines":"829,831"}},{"content":"\n<p data-lines=\"831,832\">Dynamic Groups Privesc</p>","children":[],"payload":{"lines":"831,833"}}],"payload":{"lines":"817,833"}},{"content":"\n<p data-lines=\"833,834\">AWS</p>","children":[{"content":"\n<p data-lines=\"835,836\">Basic Information</p>","children":[],"payload":{"lines":"835,837"}},{"content":"\n<p data-lines=\"837,838\">Permissions for a Pentest</p>","children":[],"payload":{"lines":"837,839"}},{"content":"\n<p data-lines=\"839,840\">Persistence</p>","children":[],"payload":{"lines":"839,841"}},{"content":"\n<p data-lines=\"841,842\">Post Exploitation</p>","children":[],"payload":{"lines":"841,843"}},{"content":"\n<p data-lines=\"843,844\">Privilege Escalation</p>","children":[],"payload":{"lines":"843,845"}},{"content":"\n<p data-lines=\"845,846\">Services</p>","children":[],"payload":{"lines":"845,847"}},{"content":"\n<p data-lines=\"847,848\">Unauthenticated Enum & Access</p>","children":[],"payload":{"lines":"847,849"}}],"payload":{"lines":"833,849"}},{"content":"\n<p data-lines=\"849,850\">GCP</p>","children":[{"content":"\n<p data-lines=\"851,852\">Basic Information</p>","children":[],"payload":{"lines":"851,853"}},{"content":"\n<p data-lines=\"853,854\">Non-svc Persistance</p>","children":[],"payload":{"lines":"853,855"}},{"content":"\n<p data-lines=\"855,856\">Permissions for a Pentest</p>","children":[],"payload":{"lines":"855,857"}},{"content":"\n<p data-lines=\"857,858\">Privilege Escalation</p>","children":[],"payload":{"lines":"857,859"}},{"content":"\n<p data-lines=\"859,860\">Services</p>","children":[],"payload":{"lines":"859,861"}},{"content":"\n<p data-lines=\"861,862\">Unauthenticated Enum</p>","children":[],"payload":{"lines":"861,863"}}],"payload":{"lines":"849,863"}},{"content":"\n<p data-lines=\"863,864\">IBM</p>","children":[{"content":"\n<p data-lines=\"865,866\">Basic Information</p>","children":[],"payload":{"lines":"865,867"}},{"content":"\n<p data-lines=\"867,868\">Hyper Protect Crypto Services</p>","children":[],"payload":{"lines":"867,869"}},{"content":"\n<p data-lines=\"869,870\">Hyper Protect Virtual Server</p>","children":[],"payload":{"lines":"869,871"}}],"payload":{"lines":"863,871"}},{"content":"\n<p data-lines=\"871,872\">Digital Ocean</p>","children":[{"content":"\n<p data-lines=\"873,874\">Basic Information</p>","children":[],"payload":{"lines":"873,875"}},{"content":"\n<p data-lines=\"875,876\">Permissions for a Pentest</p>","children":[],"payload":{"lines":"875,877"}},{"content":"\n<p data-lines=\"877,878\">Services</p>","children":[],"payload":{"lines":"877,879"}}],"payload":{"lines":"871,879"}},{"content":"\n<p data-lines=\"879,880\">Kubernetes</p>","children":[{"content":"\n<p data-lines=\"881,882\">Finding exposed pods with OSINT</p>","children":[],"payload":{"lines":"881,883"}},{"content":"\n<p data-lines=\"883,884\">Finding Exposed Pods via Port Scanning</p>","children":[],"payload":{"lines":"883,885"}},{"content":"\n<p data-lines=\"885,886\">Kubelet Authentication & Authorization</p>","children":[],"payload":{"lines":"885,887"}},{"content":"\n<p data-lines=\"887,888\">Exposing Services</p>","children":[],"payload":{"lines":"887,889"}},{"content":"\n<p data-lines=\"889,890\">Enumeration</p>","children":[],"payload":{"lines":"889,891"}},{"content":"\n<p data-lines=\"891,892\">Role-Based Access Control</p>","children":[],"payload":{"lines":"891,893"}},{"content":"\n<p data-lines=\"893,894\">Abusing Roles/ClusterRoles</p>","children":[],"payload":{"lines":"893,895"}},{"content":"\n<p data-lines=\"895,896\">Namespace Escalation</p>","children":[],"payload":{"lines":"895,897"}},{"content":"\n<p data-lines=\"897,898\">Pivoting to Clouds</p>","children":[],"payload":{"lines":"897,899"}},{"content":"\n<p data-lines=\"899,900\">Network Attacks</p>","children":[],"payload":{"lines":"899,901"}}],"payload":{"lines":"879,901"}},{"content":"\n<p data-lines=\"901,902\">CI/CD</p>","children":[{"content":"\n<p data-lines=\"903,904\">Github</p>","children":[],"payload":{"lines":"903,905"}},{"content":"\n<p data-lines=\"905,906\">Gitea</p>","children":[],"payload":{"lines":"905,907"}},{"content":"\n<p data-lines=\"907,908\">Concourse</p>","children":[],"payload":{"lines":"907,909"}},{"content":"\n<p data-lines=\"909,910\">CircleCI</p>","children":[],"payload":{"lines":"909,911"}},{"content":"\n<p data-lines=\"911,912\">TravisCI</p>","children":[],"payload":{"lines":"911,913"}},{"content":"\n<p data-lines=\"913,914\">Jenkins</p>","children":[],"payload":{"lines":"913,915"}},{"content":"\n<p data-lines=\"915,916\">Apache Airflow</p>","children":[],"payload":{"lines":"915,917"}},{"content":"\n<p data-lines=\"917,918\">Terraform</p>","children":[],"payload":{"lines":"917,919"}},{"content":"\n<p data-lines=\"919,920\">Atlantis</p>","children":[],"payload":{"lines":"919,921"}},{"content":"\n<p data-lines=\"921,922\">Cloudflare</p>","children":[],"payload":{"lines":"921,923"}}],"payload":{"lines":"901,923"}},{"content":"\n<p data-lines=\"923,924\">Active Directory</p>","children":[{"content":"\n<p data-lines=\"925,926\">Kerberos Authentication Protocol</p>","children":[],"payload":{"lines":"925,927"}},{"content":"\n<p data-lines=\"927,928\">Kerberoasting for Domain Privilege Escalation and Credential Compromise</p>","children":[],"payload":{"lines":"927,929"}},{"content":"\n<p data-lines=\"929,930\">Persistent Administrative Domain Access</p>","children":[],"payload":{"lines":"929,931"}},{"content":"\n<p data-lines=\"931,932\">Obtaining NTDS.dit and Extracting Domain Hashes</p>","children":[],"payload":{"lines":"931,933"}},{"content":"\n<p data-lines=\"933,934\">Golden and Silver Ticket Attacks for Persistence</p>","children":[],"payload":{"lines":"933,935"}},{"content":"\n<p data-lines=\"935,936\">Additional Kerberos Attacks including Skeleton Key, Over-Pass-the-Hash, and Pass-the-Ticket</p>","children":[],"payload":{"lines":"935,937"}},{"content":"\n<p data-lines=\"937,938\">Effective Domain Privilege Escalation</p>","children":[],"payload":{"lines":"937,939"}},{"content":"\n<p data-lines=\"939,940\">Azure and Azure AD Reconnaissance</p>","children":[],"payload":{"lines":"939,941"}},{"content":"\n<p data-lines=\"941,942\">Azure Password Attacks and Spraying</p>","children":[],"payload":{"lines":"941,943"}},{"content":"\n<p data-lines=\"943,944\">Understanding Azure Permissions</p>","children":[],"payload":{"lines":"943,945"}},{"content":"\n<p data-lines=\"945,946\">Running Commands on Azure Hosts</p>","children":[],"payload":{"lines":"945,947"}},{"content":"\n<p data-lines=\"947,948\">Tunneling with Ngrok</p>","children":[],"payload":{"lines":"947,949"}},{"content":"\n<p data-lines=\"949,950\">Lateral Movement in Azure</p>","children":[],"payload":{"lines":"949,951"}},{"content":"\n<p data-lines=\"951,952\">Effective Reporting and Business Communication</p>","children":[],"payload":{"lines":"951,953"}}],"payload":{"lines":"923,953"}}],"payload":{"lines":"761,953"}}],"payload":{"lines":"735,953"}},{"content":"\n<p data-lines=\"953,954\">Network</p>","children":[{"content":"\n<p data-lines=\"955,956\">Prerequisites</p>","children":[{"content":"\n<p data-lines=\"957,958\">Basics of Network</p>","children":[],"payload":{"lines":"957,959"}},{"content":"\n<p data-lines=\"959,960\">Basics of Linux</p>","children":[],"payload":{"lines":"959,961"}},{"content":"\n<p data-lines=\"961,962\">Basics of Powershell</p>","children":[],"payload":{"lines":"961,963"}},{"content":"\n<p data-lines=\"963,964\">Basics of C/C++</p>","children":[],"payload":{"lines":"963,965"}},{"content":"\n<p data-lines=\"965,966\">Professional Python</p>","children":[],"payload":{"lines":"965,967"}}],"payload":{"lines":"955,967"}},{"content":"\n<p data-lines=\"967,968\">Syllabus</p>","children":[{"content":"\n<p data-lines=\"969,970\">Introduction</p>","children":[{"content":"\n<p data-lines=\"971,972\">Linux System</p>","children":[{"content":"\n<p data-lines=\"973,974\">Linux Kernel</p>","children":[],"payload":{"lines":"973,975"}},{"content":"\n<p data-lines=\"975,976\">Basic I/O Operations</p>","children":[],"payload":{"lines":"975,977"}},{"content":"\n<p data-lines=\"977,978\">Advanced I/O interfaces</p>","children":[],"payload":{"lines":"977,979"}},{"content":"\n<p data-lines=\"979,980\">System Calls for Process Management</p>","children":[],"payload":{"lines":"979,981"}},{"content":"\n<p data-lines=\"981,982\">Advanced Process Management</p>","children":[],"payload":{"lines":"981,983"}},{"content":"\n<p data-lines=\"983,984\">Multithreaded Programming</p>","children":[],"payload":{"lines":"983,985"}},{"content":"\n<p data-lines=\"985,986\">File and Directory Management</p>","children":[],"payload":{"lines":"985,987"}},{"content":"\n<p data-lines=\"987,988\">Interfaces for Allocating Memory</p>","children":[],"payload":{"lines":"987,989"}},{"content":"\n<p data-lines=\"989,990\">Basic and Advanced Signal Interfaces</p>","children":[],"payload":{"lines":"989,991"}},{"content":"\n<p data-lines=\"991,992\">Clock Management</p>","children":[],"payload":{"lines":"991,993"}}],"payload":{"lines":"971,993"}},{"content":"\n<p data-lines=\"993,994\">Windows Internals</p>","children":[{"content":"\n<p data-lines=\"995,996\">System Architecture</p>","children":[],"payload":{"lines":"995,997"}},{"content":"\n<p data-lines=\"997,998\">Process and Jobs</p>","children":[],"payload":{"lines":"997,999"}},{"content":"\n<p data-lines=\"999,1000\">Threads</p>","children":[],"payload":{"lines":"999,1001"}},{"content":"\n<p data-lines=\"1001,1002\">Kernel Mechanisms</p>","children":[],"payload":{"lines":"1001,1003"}},{"content":"\n<p data-lines=\"1003,1004\">Memory Management</p>","children":[],"payload":{"lines":"1003,1005"}},{"content":"\n<p data-lines=\"1005,1006\">I/O System</p>","children":[],"payload":{"lines":"1005,1007"}},{"content":"\n<p data-lines=\"1007,1008\">Security</p>","children":[],"payload":{"lines":"1007,1009"}}],"payload":{"lines":"993,1009"}},{"content":"\n<p data-lines=\"1009,1010\">x86/x64 Assembly</p>","children":[{"content":"\n<p data-lines=\"1011,1012\">CPU Registers</p>","children":[],"payload":{"lines":"1011,1013"}},{"content":"\n<p data-lines=\"1013,1014\">SUB Registers</p>","children":[],"payload":{"lines":"1013,1015"}},{"content":"\n<p data-lines=\"1015,1016\">MOV Instruction</p>","children":[],"payload":{"lines":"1015,1017"}},{"content":"\n<p data-lines=\"1017,1018\">ADD and SUB Instructions</p>","children":[],"payload":{"lines":"1017,1019"}},{"content":"\n<p data-lines=\"1019,1020\">INC and DEC Instructions</p>","children":[],"payload":{"lines":"1019,1021"}},{"content":"\n<p data-lines=\"1021,1022\">MUL and DIV Instructions</p>","children":[],"payload":{"lines":"1021,1023"}},{"content":"\n<p data-lines=\"1023,1024\">PUSH and POP Instructions</p>","children":[],"payload":{"lines":"1023,1025"}},{"content":"\n<p data-lines=\"1025,1026\">CMP and JMP Instructions</p>","children":[],"payload":{"lines":"1025,1027"}},{"content":"\n<p data-lines=\"1027,1028\">CALL and RET Instructions</p>","children":[],"payload":{"lines":"1027,1029"}},{"content":"\n<p data-lines=\"1029,1030\">Avoiding Null Bytes</p>","children":[],"payload":{"lines":"1029,1031"}},{"content":"\n<p data-lines=\"1031,1032\">Function Calls</p>","children":[],"payload":{"lines":"1031,1033"}},{"content":"\n<p data-lines=\"1033,1034\">Input and Output Functions</p>","children":[],"payload":{"lines":"1033,1035"}},{"content":"\n<p data-lines=\"1035,1036\">Code Caves</p>","children":[],"payload":{"lines":"1035,1037"}},{"content":"\n<p data-lines=\"1037,1038\">Structured Programming</p>","children":[],"payload":{"lines":"1037,1039"}},{"content":"\n<p data-lines=\"1039,1040\">Bitwise Operations</p>","children":[],"payload":{"lines":"1039,1041"}},{"content":"\n<p data-lines=\"1041,1042\">Signed Operations</p>","children":[],"payload":{"lines":"1041,1043"}},{"content":"\n<p data-lines=\"1043,1044\">Memory Arrays</p>","children":[],"payload":{"lines":"1043,1045"}}],"payload":{"lines":"1009,1045"}}],"payload":{"lines":"969,1045"}},{"content":"\n<p data-lines=\"1045,1046\">Intelligence Gathering</p>","children":[{"content":"\n<p data-lines=\"1047,1048\">Internet Footprinting</p>","children":[{"content":"\n<p data-lines=\"1049,1050\">Email addresses</p>","children":[],"payload":{"lines":"1049,1051"}},{"content":"\n<p data-lines=\"1051,1052\">Usernames/Handles</p>","children":[],"payload":{"lines":"1051,1053"}},{"content":"\n<p data-lines=\"1053,1054\">Social Networks</p>","children":[],"payload":{"lines":"1053,1055"}},{"content":"\n<p data-lines=\"1055,1056\">Personal Domain Names</p>","children":[],"payload":{"lines":"1055,1057"}},{"content":"\n<p data-lines=\"1057,1058\">Personal Activities</p>","children":[],"payload":{"lines":"1057,1059"}},{"content":"\n<p data-lines=\"1059,1060\">Archived Information</p>","children":[],"payload":{"lines":"1059,1061"}},{"content":"\n<p data-lines=\"1061,1062\">Electronic Data</p>","children":[],"payload":{"lines":"1061,1063"}}],"payload":{"lines":"1047,1063"}},{"content":"\n<p data-lines=\"1063,1064\">External Footprinting</p>","children":[{"content":"\n<p data-lines=\"1065,1066\">WHOIS lookup</p>","children":[],"payload":{"lines":"1065,1067"}},{"content":"\n<p data-lines=\"1067,1068\">BGP looking glasses</p>","children":[],"payload":{"lines":"1067,1069"}},{"content":"\n<p data-lines=\"1069,1070\">Zone Transfers</p>","children":[],"payload":{"lines":"1069,1071"}},{"content":"\n<p data-lines=\"1071,1072\">Reverse DNS</p>","children":[],"payload":{"lines":"1071,1073"}},{"content":"\n<p data-lines=\"1073,1074\">DNS Bruting</p>","children":[],"payload":{"lines":"1073,1075"}},{"content":"\n<p data-lines=\"1075,1076\">Port Scanning</p>","children":[],"payload":{"lines":"1075,1077"}},{"content":"\n<p data-lines=\"1077,1078\">SNMP Sweeps</p>","children":[],"payload":{"lines":"1077,1079"}},{"content":"\n<p data-lines=\"1079,1080\">SMTP Bounce Back</p>","children":[],"payload":{"lines":"1079,1081"}},{"content":"\n<p data-lines=\"1081,1082\">Banner Grabbing</p>","children":[],"payload":{"lines":"1081,1083"}}],"payload":{"lines":"1063,1083"}},{"content":"\n<p data-lines=\"1083,1084\">Internal Footprinting</p>","children":[{"content":"\n<p data-lines=\"1085,1086\">Ping Sweeps</p>","children":[],"payload":{"lines":"1085,1087"}},{"content":"\n<p data-lines=\"1087,1088\">Port Scanning</p>","children":[],"payload":{"lines":"1087,1089"}},{"content":"\n<p data-lines=\"1089,1090\">SNMP Sweeps</p>","children":[],"payload":{"lines":"1089,1091"}},{"content":"\n<p data-lines=\"1091,1092\">Metasploit</p>","children":[],"payload":{"lines":"1091,1093"}},{"content":"\n<p data-lines=\"1093,1094\">Zone Transfers</p>","children":[],"payload":{"lines":"1093,1095"}},{"content":"\n<p data-lines=\"1095,1096\">SMTP Bounce Back</p>","children":[],"payload":{"lines":"1095,1097"}},{"content":"\n<p data-lines=\"1097,1098\">Reverse DNS</p>","children":[],"payload":{"lines":"1097,1099"}},{"content":"\n<p data-lines=\"1099,1100\">Banner Grabbing</p>","children":[],"payload":{"lines":"1099,1101"}},{"content":"\n<p data-lines=\"1101,1102\">VoIP Mapping</p>","children":[],"payload":{"lines":"1101,1103"}},{"content":"\n<p data-lines=\"1103,1104\">Passive Reconnaissance</p>","children":[],"payload":{"lines":"1103,1105"}}],"payload":{"lines":"1083,1105"}}],"payload":{"lines":"1045,1105"}},{"content":"\n<p data-lines=\"1105,1106\">Vulnerability Analysis</p>","children":[{"content":"\n<p data-lines=\"1107,1108\">Vulnerability Testing</p>","children":[{"content":"\n<p data-lines=\"1109,1110\">Automated Tools</p>","children":[],"payload":{"lines":"1109,1111"}},{"content":"\n<p data-lines=\"1111,1112\">Passive Testing</p>","children":[],"payload":{"lines":"1111,1113"}}],"payload":{"lines":"1107,1113"}},{"content":"\n<p data-lines=\"1113,1114\">Vulnerability Validation</p>","children":[{"content":"\n<p data-lines=\"1115,1116\">Public Research</p>","children":[],"payload":{"lines":"1115,1117"}},{"content":"\n<p data-lines=\"1117,1118\">Establish Target List</p>","children":[],"payload":{"lines":"1117,1119"}}],"payload":{"lines":"1113,1119"}},{"content":"\n<p data-lines=\"1119,1120\">Attack Avenues</p>","children":[{"content":"\n<p data-lines=\"1121,1122\">Creation of Attack Trees</p>","children":[],"payload":{"lines":"1121,1123"}},{"content":"\n<p data-lines=\"1123,1124\">Identify Protection Mechanisms</p>","children":[],"payload":{"lines":"1123,1125"}}],"payload":{"lines":"1119,1125"}}],"payload":{"lines":"1105,1125"}},{"content":"\n<p data-lines=\"1125,1126\">Logical Vulnerabilities</p>","children":[{"content":"\n<p data-lines=\"1127,1128\">Authentication Cracking</p>","children":[{"content":"\n<p data-lines=\"1129,1130\">OSPF</p>","children":[],"payload":{"lines":"1129,1131"}},{"content":"\n<p data-lines=\"1131,1132\">EIGRP</p>","children":[],"payload":{"lines":"1131,1133"}},{"content":"\n<p data-lines=\"1133,1134\">HSRP</p>","children":[],"payload":{"lines":"1133,1135"}},{"content":"\n<p data-lines=\"1135,1136\">VRRP</p>","children":[],"payload":{"lines":"1135,1137"}},{"content":"\n<p data-lines=\"1137,1138\">GLBP</p>","children":[],"payload":{"lines":"1137,1139"}},{"content":"\n<p data-lines=\"1139,1140\">TACACS+</p>","children":[],"payload":{"lines":"1139,1141"}}],"payload":{"lines":"1127,1141"}},{"content":"\n<p data-lines=\"1141,1142\">Configuration Exfiltration</p>","children":[{"content":"\n<p data-lines=\"1143,1144\">Cisco Smart Install Exploiting</p>","children":[],"payload":{"lines":"1143,1145"}},{"content":"\n<p data-lines=\"1145,1146\">Cisco EEM for Hiding USER</p>","children":[],"payload":{"lines":"1145,1147"}},{"content":"\n<p data-lines=\"1147,1148\">SNMP RW against Cisco Router</p>","children":[],"payload":{"lines":"1147,1149"}},{"content":"\n<p data-lines=\"1149,1150\">Attack FTP/TFTP Server</p>","children":[],"payload":{"lines":"1149,1151"}}],"payload":{"lines":"1141,1151"}},{"content":"\n<p data-lines=\"1151,1152\">Cisco Passwords</p>","children":[{"content":"\n<p data-lines=\"1153,1154\">Type 0 (Cleartext Password)</p>","children":[],"payload":{"lines":"1153,1155"}},{"content":"\n<p data-lines=\"1155,1156\">Type 4 (SHA-256)</p>","children":[],"payload":{"lines":"1155,1157"}},{"content":"\n<p data-lines=\"1157,1158\">Type 5 (MD5)</p>","children":[],"payload":{"lines":"1157,1159"}},{"content":"\n<p data-lines=\"1159,1160\">Type 7 (Vigenere Cipher)</p>","children":[],"payload":{"lines":"1159,1161"}},{"content":"\n<p data-lines=\"1161,1162\">Type 9 (SCRYPT)</p>","children":[],"payload":{"lines":"1161,1163"}}],"payload":{"lines":"1151,1163"}},{"content":"\n<p data-lines=\"1163,1164\">MITM Attacks</p>","children":[{"content":"\n<p data-lines=\"1165,1166\">Prologue</p>","children":[],"payload":{"lines":"1165,1167"}},{"content":"\n<p data-lines=\"1167,1168\">STP Hijacking</p>","children":[],"payload":{"lines":"1167,1169"}},{"content":"\n<p data-lines=\"1169,1170\">ARP Spoofing</p>","children":[],"payload":{"lines":"1169,1171"}},{"content":"\n<p data-lines=\"1171,1172\">FHRP Hijacking</p>","children":[],"payload":{"lines":"1171,1173"}},{"content":"\n<p data-lines=\"1173,1174\">DHCP Spoofing</p>","children":[],"payload":{"lines":"1173,1175"}},{"content":"\n<p data-lines=\"1175,1176\">DRP Evil Twin</p>","children":[],"payload":{"lines":"1175,1177"}},{"content":"\n<p data-lines=\"1177,1178\">LLMNR/NBNS/mDNS Poisoning</p>","children":[],"payload":{"lines":"1177,1179"}},{"content":"\n<p data-lines=\"1179,1180\">CAM Table Overflow</p>","children":[],"payload":{"lines":"1179,1181"}},{"content":"\n<p data-lines=\"1181,1182\">TTL Shifting</p>","children":[],"payload":{"lines":"1181,1183"}},{"content":"\n<p data-lines=\"1183,1184\">Credentials Sniffing</p>","children":[],"payload":{"lines":"1183,1185"}}],"payload":{"lines":"1163,1185"}},{"content":"\n<p data-lines=\"1185,1186\">Traffic Hijacking</p>","children":[{"content":"\n<p data-lines=\"1187,1188\">Traffic Interception with Cisco ERSPAN</p>","children":[],"payload":{"lines":"1187,1189"}},{"content":"\n<p data-lines=\"1189,1190\">Traffic Interception with Mikrotik TZSP</p>","children":[],"payload":{"lines":"1189,1191"}}],"payload":{"lines":"1185,1191"}},{"content":"\n<p data-lines=\"1191,1192\">GRE Privoting</p>","children":[{"content":"\n<p data-lines=\"1193,1194\">L3 GRE through Cisco IOS</p>","children":[],"payload":{"lines":"1193,1195"}},{"content":"\n<p data-lines=\"1195,1196\">L3 GRE through RouterOS</p>","children":[],"payload":{"lines":"1195,1197"}},{"content":"\n<p data-lines=\"1197,1198\">MTU Fixing</p>","children":[],"payload":{"lines":"1197,1199"}},{"content":"\n<p data-lines=\"1199,1200\">L2 GRE Tunnel Through L3 GRE Tunnel</p>","children":[],"payload":{"lines":"1199,1201"}}],"payload":{"lines":"1191,1201"}},{"content":"\n<p data-lines=\"1201,1202\">Dynamic IGP Routing</p>","children":[{"content":"\n<p data-lines=\"1203,1204\">OSPF</p>","children":[],"payload":{"lines":"1203,1205"}},{"content":"\n<p data-lines=\"1205,1206\">EIGRP</p>","children":[],"payload":{"lines":"1205,1207"}}],"payload":{"lines":"1201,1207"}},{"content":"\n<p data-lines=\"1207,1208\">Denial of Service</p>","children":[{"content":"\n<p data-lines=\"1209,1210\">CDP Flooding</p>","children":[],"payload":{"lines":"1209,1211"}},{"content":"\n<p data-lines=\"1211,1212\">OSPF & EIGRP Blackhole Attack</p>","children":[],"payload":{"lines":"1211,1213"}},{"content":"\n<p data-lines=\"1213,1214\">EIGRP Routing Table Overflow</p>","children":[],"payload":{"lines":"1213,1215"}},{"content":"\n<p data-lines=\"1215,1216\">Fake EIGRP Neighbors</p>","children":[],"payload":{"lines":"1215,1217"}},{"content":"\n<p data-lines=\"1217,1218\">VTP Frame Injection</p>","children":[],"payload":{"lines":"1217,1219"}},{"content":"\n<p data-lines=\"1219,1220\">DHCP Exhaustion Attack</p>","children":[],"payload":{"lines":"1219,1221"}},{"content":"\n<p data-lines=\"1221,1222\">ICMP Smurf</p>","children":[],"payload":{"lines":"1221,1223"}},{"content":"\n<p data-lines=\"1223,1224\">TCP SYN Flood</p>","children":[],"payload":{"lines":"1223,1225"}},{"content":"\n<p data-lines=\"1225,1226\">UDP Flood</p>","children":[],"payload":{"lines":"1225,1227"}},{"content":"\n<p data-lines=\"1227,1228\">Reset EIGRP Neighborship</p>","children":[],"payload":{"lines":"1227,1229"}},{"content":"\n<p data-lines=\"1229,1230\">ARP Cage Attack</p>","children":[],"payload":{"lines":"1229,1231"}}],"payload":{"lines":"1207,1231"}},{"content":"\n<p data-lines=\"1231,1232\">VLAN Bypassing</p>","children":[{"content":"\n<p data-lines=\"1233,1234\">DTP Injection</p>","children":[],"payload":{"lines":"1233,1235"}},{"content":"\n<p data-lines=\"1235,1236\">CDP Injection</p>","children":[],"payload":{"lines":"1235,1237"}},{"content":"\n<p data-lines=\"1237,1238\">Double Tagging</p>","children":[],"payload":{"lines":"1237,1239"}},{"content":"\n<p data-lines=\"1239,1240\">Access to Switch & Configure 802.1q trunk</p>","children":[],"payload":{"lines":"1239,1241"}}],"payload":{"lines":"1231,1241"}},{"content":"\n<p data-lines=\"1241,1242\">NAC/802.1X Bypassing</p>","children":[{"content":"\n<p data-lines=\"1243,1244\">Find some Legitimate Device</p>","children":[],"payload":{"lines":"1243,1245"}},{"content":"\n<p data-lines=\"1245,1246\">Bridge-Based Attack</p>","children":[],"payload":{"lines":"1245,1247"}},{"content":"\n<p data-lines=\"1247,1248\">Evil Twin</p>","children":[],"payload":{"lines":"1247,1249"}},{"content":"\n<p data-lines=\"1249,1250\">MAC Authentication Bypass</p>","children":[],"payload":{"lines":"1249,1251"}}],"payload":{"lines":"1241,1251"}}],"payload":{"lines":"1125,1251"}},{"content":"\n<p data-lines=\"1251,1252\">Exploitation of Remote Services (User-Mode)</p>","children":[{"content":"\n<p data-lines=\"1253,1254\">Linux</p>","children":[{"content":"\n<p data-lines=\"1255,1256\">Introduction</p>","children":[{"content":"\n<p data-lines=\"1257,1258\">Reverse Engineering</p>","children":[{"content":"\n<p data-lines=\"1259,1260\">GDB and Extensions</p>","children":[],"payload":{"lines":"1259,1261"}},{"content":"\n<p data-lines=\"1261,1262\">Ghidra and Extensions</p>","children":[],"payload":{"lines":"1261,1263"}}],"payload":{"lines":"1257,1263"}},{"content":"\n<p data-lines=\"1263,1264\">GLibc Heap</p>","children":[{"content":"\n<p data-lines=\"1265,1266\">malloc_chunk</p>","children":[],"payload":{"lines":"1265,1267"}},{"content":"\n<p data-lines=\"1267,1268\">malloc_state</p>","children":[],"payload":{"lines":"1267,1269"}},{"content":"\n<p data-lines=\"1269,1270\">Bins and Chunks</p>","children":[],"payload":{"lines":"1269,1271"}},{"content":"\n<p data-lines=\"1271,1272\">Internal Functions</p>","children":[],"payload":{"lines":"1271,1273"}},{"content":"\n<p data-lines=\"1273,1274\">Core Functions</p>","children":[],"payload":{"lines":"1273,1275"}},{"content":"\n<p data-lines=\"1275,1276\">Security Checks</p>","children":[],"payload":{"lines":"1275,1277"}}],"payload":{"lines":"1263,1277"}}],"payload":{"lines":"1255,1277"}},{"content":"\n<p data-lines=\"1277,1278\">Vulnerabilities</p>","children":[{"content":"\n<p data-lines=\"1279,1280\">Stack Overflow</p>","children":[{"content":"\n<p data-lines=\"1281,1282\">Buffer Overflow</p>","children":[],"payload":{"lines":"1281,1283"}},{"content":"\n<p data-lines=\"1283,1284\">Buffer Underflow</p>","children":[],"payload":{"lines":"1283,1285"}},{"content":"\n<p data-lines=\"1285,1286\">Exploiting SEH Overflows</p>","children":[],"payload":{"lines":"1285,1287"}},{"content":"\n<p data-lines=\"1287,1288\">Linear SEH Record Overwrite</p>","children":[],"payload":{"lines":"1287,1289"}},{"content":"\n<p data-lines=\"1289,1290\">Linear Return Address Overwrite</p>","children":[],"payload":{"lines":"1289,1291"}},{"content":"\n<p data-lines=\"1291,1292\">Linear Local Variable Overwrite</p>","children":[],"payload":{"lines":"1291,1293"}},{"content":"\n<p data-lines=\"1293,1294\">Linear Parameter Overwrite</p>","children":[],"payload":{"lines":"1293,1295"}},{"content":"\n<p data-lines=\"1295,1296\">Non-Linear/Backward Overwrites</p>","children":[],"payload":{"lines":"1295,1297"}}],"payload":{"lines":"1279,1297"}},{"content":"\n<p data-lines=\"1297,1298\">Integer Overflow</p>","children":[{"content":"\n<p data-lines=\"1299,1300\">Buffer Overflow</p>","children":[],"payload":{"lines":"1299,1301"}},{"content":"\n<p data-lines=\"1301,1302\">Buffer Underflow</p>","children":[],"payload":{"lines":"1301,1303"}},{"content":"\n<p data-lines=\"1303,1304\">Widthness Overflows</p>","children":[],"payload":{"lines":"1303,1305"}},{"content":"\n<p data-lines=\"1305,1306\">Arithmetic Overflows</p>","children":[],"payload":{"lines":"1305,1307"}},{"content":"\n<p data-lines=\"1307,1308\">Signedness Bugs</p>","children":[],"payload":{"lines":"1307,1309"}}],"payload":{"lines":"1297,1309"}},{"content":"\n<p data-lines=\"1309,1310\">Heap Overflow</p>","children":[{"content":"\n<p data-lines=\"1311,1312\">Buffer Overflow</p>","children":[],"payload":{"lines":"1311,1313"}},{"content":"\n<p data-lines=\"1313,1314\">Buffer Underflow</p>","children":[],"payload":{"lines":"1313,1315"}},{"content":"\n<p data-lines=\"1315,1316\">Tcache Dup</p>","children":[],"payload":{"lines":"1315,1317"}},{"content":"\n<p data-lines=\"1317,1318\">Fastbin Dup</p>","children":[],"payload":{"lines":"1317,1319"}},{"content":"\n<p data-lines=\"1319,1320\">Poison Null Byte</p>","children":[],"payload":{"lines":"1319,1321"}},{"content":"\n<p data-lines=\"1321,1322\">House of Orange</p>","children":[],"payload":{"lines":"1321,1323"}},{"content":"\n<p data-lines=\"1323,1324\">House of Corrosion</p>","children":[],"payload":{"lines":"1323,1325"}},{"content":"\n<p data-lines=\"1325,1326\">House of Spirit</p>","children":[],"payload":{"lines":"1325,1327"}},{"content":"\n<p data-lines=\"1327,1328\">House of Lore</p>","children":[],"payload":{"lines":"1327,1329"}},{"content":"\n<p data-lines=\"1329,1330\">House of Force</p>","children":[],"payload":{"lines":"1329,1331"}},{"content":"\n<p data-lines=\"1331,1332\">House of Einherjar</p>","children":[],"payload":{"lines":"1331,1333"}},{"content":"\n<p data-lines=\"1333,1334\">House of Rabbit</p>","children":[],"payload":{"lines":"1333,1335"}},{"content":"\n<p data-lines=\"1335,1336\">Marauder's mmap</p>","children":[],"payload":{"lines":"1335,1337"}},{"content":"\n<p data-lines=\"1337,1338\">Single-Byte</p>","children":[],"payload":{"lines":"1337,1339"}},{"content":"\n<p data-lines=\"1339,1340\">One-Byte</p>","children":[],"payload":{"lines":"1339,1341"}}],"payload":{"lines":"1309,1341"}},{"content":"\n<p data-lines=\"1341,1342\">Use After Free</p>","children":[{"content":"\n<p data-lines=\"1343,1344\">First Fit</p>","children":[],"payload":{"lines":"1343,1345"}},{"content":"\n<p data-lines=\"1345,1346\">Double Free</p>","children":[],"payload":{"lines":"1345,1347"}},{"content":"\n<p data-lines=\"1347,1348\">Forging Chunks</p>","children":[],"payload":{"lines":"1347,1349"}},{"content":"\n<p data-lines=\"1349,1350\">Shrinking Free Chunks</p>","children":[],"payload":{"lines":"1349,1351"}},{"content":"\n<p data-lines=\"1351,1352\">Safe Linking</p>","children":[],"payload":{"lines":"1351,1353"}},{"content":"\n<p data-lines=\"1353,1354\">Unsafe Unlink</p>","children":[],"payload":{"lines":"1353,1355"}}],"payload":{"lines":"1341,1355"}},{"content":"\n<p data-lines=\"1355,1356\">Format String</p>","children":[{"content":"\n<p data-lines=\"1357,1358\">Format Functions</p>","children":[],"payload":{"lines":"1357,1359"}},{"content":"\n<p data-lines=\"1359,1360\">Viewing Process Memory</p>","children":[],"payload":{"lines":"1359,1361"}},{"content":"\n<p data-lines=\"1361,1362\">Overwriting Arbitrary Memory</p>","children":[],"payload":{"lines":"1361,1363"}},{"content":"\n<p data-lines=\"1363,1364\">Variations of Exploitation</p>","children":[],"payload":{"lines":"1363,1365"}},{"content":"\n<p data-lines=\"1365,1366\">Brute Forcing</p>","children":[],"payload":{"lines":"1365,1367"}}],"payload":{"lines":"1355,1367"}},{"content":"\n<p data-lines=\"1367,1368\">Null Dereference</p>","children":[{"content":"\n<p data-lines=\"1369,1370\">Nullable Types</p>","children":[],"payload":{"lines":"1369,1371"}},{"content":"\n<p data-lines=\"1371,1372\">Uninitialized Pointer</p>","children":[],"payload":{"lines":"1371,1373"}},{"content":"\n<p data-lines=\"1373,1374\">Expired Pointer Dereference</p>","children":[],"payload":{"lines":"1373,1375"}}],"payload":{"lines":"1367,1375"}},{"content":"\n<p data-lines=\"1375,1376\">Out-of-Bounds</p>","children":[{"content":"\n<p data-lines=\"1377,1378\">Read</p>","children":[],"payload":{"lines":"1377,1379"}},{"content":"\n<p data-lines=\"1379,1380\">Write</p>","children":[],"payload":{"lines":"1379,1381"}}],"payload":{"lines":"1375,1381"}},{"content":"\n<p data-lines=\"1381,1382\">Type Confusion</p>","children":[{"content":"\n<p data-lines=\"1383,1384\">Static Casting</p>","children":[],"payload":{"lines":"1383,1385"}},{"content":"\n<p data-lines=\"1385,1386\">Dynamic Casting</p>","children":[],"payload":{"lines":"1385,1387"}},{"content":"\n<p data-lines=\"1387,1388\">C-style Casting</p>","children":[],"payload":{"lines":"1387,1389"}}],"payload":{"lines":"1381,1389"}}],"payload":{"lines":"1277,1389"}},{"content":"\n<p data-lines=\"1389,1390\">Bypass Mitigations</p>","children":[{"content":"\n<p data-lines=\"1391,1392\">SafeSEH/SEHOP</p>","children":[{"content":"\n<p data-lines=\"1393,1394\">Module Not SafeSEH Protected</p>","children":[],"payload":{"lines":"1393,1395"}},{"content":"\n<p data-lines=\"1395,1396\">Recreate SEH Chain</p>","children":[],"payload":{"lines":"1395,1397"}}],"payload":{"lines":"1391,1397"}},{"content":"\n<p data-lines=\"1397,1398\">Stack Canary/Guard</p>","children":[{"content":"\n<p data-lines=\"1399,1400\">Brute Force Attack</p>","children":[],"payload":{"lines":"1399,1401"}},{"content":"\n<p data-lines=\"1401,1402\">Data Leaking</p>","children":[],"payload":{"lines":"1401,1403"}}],"payload":{"lines":"1397,1403"}},{"content":"\n<p data-lines=\"1403,1404\">DEP/NX</p>","children":[{"content":"\n<p data-lines=\"1405,1406\">Egg Hunters</p>","children":[],"payload":{"lines":"1405,1407"}},{"content":"\n<p data-lines=\"1407,1408\">Return2Libc</p>","children":[],"payload":{"lines":"1407,1409"}},{"content":"\n<p data-lines=\"1409,1410\">Return2PLT</p>","children":[],"payload":{"lines":"1409,1411"}},{"content":"\n<p data-lines=\"1411,1412\">RET2ESP</p>","children":[],"payload":{"lines":"1411,1413"}},{"content":"\n<p data-lines=\"1413,1414\">RET2REG</p>","children":[],"payload":{"lines":"1413,1415"}},{"content":"\n<p data-lines=\"1415,1416\">Return2CSU</p>","children":[],"payload":{"lines":"1415,1417"}},{"content":"\n<p data-lines=\"1417,1418\">Return Oriented Programming</p>","children":[],"payload":{"lines":"1417,1419"}},{"content":"\n<p data-lines=\"1419,1420\">Jump Oriented Programming</p>","children":[],"payload":{"lines":"1419,1421"}},{"content":"\n<p data-lines=\"1421,1422\">Data Oriented Programming</p>","children":[],"payload":{"lines":"1421,1423"}},{"content":"\n<p data-lines=\"1423,1424\">String Oriented Programming</p>","children":[],"payload":{"lines":"1423,1425"}},{"content":"\n<p data-lines=\"1425,1426\">Pure Call Oriented Programming</p>","children":[],"payload":{"lines":"1425,1427"}},{"content":"\n<p data-lines=\"1427,1428\">Sigreturn Oriented Programming</p>","children":[],"payload":{"lines":"1427,1429"}},{"content":"\n<p data-lines=\"1429,1430\">Blind Return Oriented Programming</p>","children":[],"payload":{"lines":"1429,1431"}},{"content":"\n<p data-lines=\"1431,1432\">Stack Pivoting</p>","children":[],"payload":{"lines":"1431,1433"}}],"payload":{"lines":"1403,1433"}},{"content":"\n<p data-lines=\"1433,1434\">ASLR/PIE/PIC</p>","children":[{"content":"\n<p data-lines=\"1435,1436\">Egg Hunters</p>","children":[],"payload":{"lines":"1435,1437"}},{"content":"\n<p data-lines=\"1437,1438\">Return2Libc</p>","children":[],"payload":{"lines":"1437,1439"}},{"content":"\n<p data-lines=\"1439,1440\">Return2PLT</p>","children":[],"payload":{"lines":"1439,1441"}},{"content":"\n<p data-lines=\"1441,1442\">RET2ESP</p>","children":[],"payload":{"lines":"1441,1443"}},{"content":"\n<p data-lines=\"1443,1444\">RET2REG</p>","children":[],"payload":{"lines":"1443,1445"}},{"content":"\n<p data-lines=\"1445,1446\">Return2CSU</p>","children":[],"payload":{"lines":"1445,1447"}},{"content":"\n<p data-lines=\"1447,1448\">GOT Overwrite</p>","children":[],"payload":{"lines":"1447,1449"}},{"content":"\n<p data-lines=\"1449,1450\">Return Oriented Programming</p>","children":[],"payload":{"lines":"1449,1451"}},{"content":"\n<p data-lines=\"1451,1452\">Jump Oriented Programming</p>","children":[],"payload":{"lines":"1451,1453"}},{"content":"\n<p data-lines=\"1453,1454\">Data Oriented Programming</p>","children":[],"payload":{"lines":"1453,1455"}},{"content":"\n<p data-lines=\"1455,1456\">String Oriented Programming</p>","children":[],"payload":{"lines":"1455,1457"}},{"content":"\n<p data-lines=\"1457,1458\">Pure Call Oriented Programming</p>","children":[],"payload":{"lines":"1457,1459"}},{"content":"\n<p data-lines=\"1459,1460\">Sigreturn Oriented Programming</p>","children":[],"payload":{"lines":"1459,1461"}},{"content":"\n<p data-lines=\"1461,1462\">Blind Return Oriented Programming</p>","children":[],"payload":{"lines":"1461,1463"}},{"content":"\n<p data-lines=\"1463,1464\">Stack Pivoting</p>","children":[],"payload":{"lines":"1463,1465"}},{"content":"\n<p data-lines=\"1465,1466\">JIT Spraying</p>","children":[],"payload":{"lines":"1465,1467"}},{"content":"\n<p data-lines=\"1467,1468\">Heap Spraying</p>","children":[],"payload":{"lines":"1467,1469"}},{"content":"\n<p data-lines=\"1469,1470\">Heap Feng Shui</p>","children":[],"payload":{"lines":"1469,1471"}},{"content":"\n<p data-lines=\"1471,1472\">JIT-Return Oriented Programming</p>","children":[],"payload":{"lines":"1471,1473"}},{"content":"\n<p data-lines=\"1473,1474\">Info Leak</p>","children":[],"payload":{"lines":"1473,1475"}},{"content":"\n<p data-lines=\"1475,1476\">Brute Force Attack</p>","children":[],"payload":{"lines":"1475,1477"}},{"content":"\n<p data-lines=\"1477,1478\">Blindside Attack</p>","children":[],"payload":{"lines":"1477,1479"}},{"content":"\n<p data-lines=\"1479,1480\">Return2dlResolve</p>","children":[],"payload":{"lines":"1479,1481"}}],"payload":{"lines":"1433,1481"}},{"content":"\n<p data-lines=\"1481,1482\">RELRO</p>","children":[{"content":"\n<p data-lines=\"1483,1484\">Return Oriented Programming</p>","children":[],"payload":{"lines":"1483,1485"}},{"content":"\n<p data-lines=\"1485,1486\">Jump Oriented Programming</p>","children":[],"payload":{"lines":"1485,1487"}}],"payload":{"lines":"1481,1487"}},{"content":"\n<p data-lines=\"1487,1488\">CFI/CPI/CPS/CET</p>","children":[{"content":"\n<p data-lines=\"1489,1490\">Loop Oriented Programming</p>","children":[],"payload":{"lines":"1489,1491"}},{"content":"\n<p data-lines=\"1491,1492\">Block Oriented Programming</p>","children":[],"payload":{"lines":"1491,1493"}},{"content":"\n<p data-lines=\"1493,1494\">Data Oriented Programming</p>","children":[],"payload":{"lines":"1493,1495"}},{"content":"\n<p data-lines=\"1495,1496\">Counterfeit Object-Oriented Programming</p>","children":[],"payload":{"lines":"1495,1497"}},{"content":"\n<p data-lines=\"1497,1498\">Non-CFG Module (Unprotected Indirect Call)</p>","children":[],"payload":{"lines":"1497,1499"}},{"content":"\n<p data-lines=\"1499,1500\">Chakra’s JIT Compiler</p>","children":[],"payload":{"lines":"1499,1501"}},{"content":"\n<p data-lines=\"1501,1502\">Corrupting Stack-Spilled Registers</p>","children":[],"payload":{"lines":"1501,1503"}},{"content":"\n<p data-lines=\"1503,1504\">Corrupting Return Address</p>","children":[],"payload":{"lines":"1503,1505"}}],"payload":{"lines":"1487,1505"}}],"payload":{"lines":"1389,1505"}},{"content":"\n<p data-lines=\"1505,1506\">Shellcode Development</p>","children":[{"content":"\n<p data-lines=\"1507,1508\">Memory Management</p>","children":[],"payload":{"lines":"1507,1509"}},{"content":"\n<p data-lines=\"1509,1510\">Disassembling Binaries</p>","children":[],"payload":{"lines":"1509,1511"}},{"content":"\n<p data-lines=\"1511,1512\">Assembly Layout</p>","children":[],"payload":{"lines":"1511,1513"}},{"content":"\n<p data-lines=\"1513,1514\">Linux Syscalls</p>","children":[],"payload":{"lines":"1513,1515"}},{"content":"\n<p data-lines=\"1515,1516\">Compiling and Extracting Shellcode</p>","children":[],"payload":{"lines":"1515,1517"}},{"content":"\n<p data-lines=\"1517,1518\">Techniques to Removing Bad Characters</p>","children":[],"payload":{"lines":"1517,1519"}},{"content":"\n<p data-lines=\"1519,1520\">Debugging Shellcode Using Various Debuggers</p>","children":[],"payload":{"lines":"1519,1521"}},{"content":"\n<p data-lines=\"1521,1522\">Linux Shellcode and File Descriptors</p>","children":[],"payload":{"lines":"1521,1523"}},{"content":"\n<p data-lines=\"1523,1524\">Locating and Manipulating Strings in Memory</p>","children":[],"payload":{"lines":"1523,1525"}},{"content":"\n<p data-lines=\"1525,1526\">Reusing Shellcode Blocks</p>","children":[],"payload":{"lines":"1525,1527"}},{"content":"\n<p data-lines=\"1527,1528\">Linux Command Execution Shellcode</p>","children":[],"payload":{"lines":"1527,1529"}},{"content":"\n<p data-lines=\"1529,1530\">64-bit Null Free Shellcode</p>","children":[],"payload":{"lines":"1529,1531"}},{"content":"\n<p data-lines=\"1531,1532\">Port Bind Shellcode</p>","children":[],"payload":{"lines":"1531,1533"}},{"content":"\n<p data-lines=\"1533,1534\">Write 64-bit portbind shellcode</p>","children":[],"payload":{"lines":"1533,1535"}},{"content":"\n<p data-lines=\"1535,1536\">Shellcode to be Null Free and Small</p>","children":[],"payload":{"lines":"1535,1537"}},{"content":"\n<p data-lines=\"1537,1538\">Metasploit Shellcode Tools</p>","children":[],"payload":{"lines":"1537,1539"}},{"content":"\n<p data-lines=\"1539,1540\">Polymorphic Shellcode</p>","children":[],"payload":{"lines":"1539,1541"}},{"content":"\n<p data-lines=\"1541,1542\">Metamorphic Shellcode</p>","children":[],"payload":{"lines":"1541,1543"}},{"content":"\n<p data-lines=\"1543,1544\">Oligomorphic Shellcode</p>","children":[],"payload":{"lines":"1543,1545"}}],"payload":{"lines":"1505,1545"}},{"content":"\n<p data-lines=\"1545,1546\">Fuzzing and Crash Analysis</p>","children":[{"content":"\n<p data-lines=\"1547,1548\">Analysis of Generational and Mutational Fuzzing</p>","children":[{"content":"\n<p data-lines=\"1549,1550\">Attack Surface Analysis</p>","children":[],"payload":{"lines":"1549,1551"}},{"content":"\n<p data-lines=\"1551,1552\">Effective Mutation Engines</p>","children":[],"payload":{"lines":"1551,1553"}},{"content":"\n<p data-lines=\"1553,1554\">Effective Corpus Generation</p>","children":[],"payload":{"lines":"1553,1555"}},{"content":"\n<p data-lines=\"1555,1556\">Protocol and File Format Grammars</p>","children":[],"payload":{"lines":"1555,1557"}},{"content":"\n<p data-lines=\"1557,1558\">Crash Detection</p>","children":[],"payload":{"lines":"1557,1559"}}],"payload":{"lines":"1547,1559"}},{"content":"\n<p data-lines=\"1559,1560\">Fuzzing File and Network Parsers with Coverage Guided Fuzzing</p>","children":[{"content":"\n<p data-lines=\"1561,1562\">Fuzz any Ubuntu/Debian Package with AFL</p>","children":[],"payload":{"lines":"1561,1563"}},{"content":"\n<p data-lines=\"1563,1564\">Modifying Targets and Writing Harnesses with LibFuzzer</p>","children":[],"payload":{"lines":"1563,1565"}},{"content":"\n<p data-lines=\"1565,1566\">Fuzzing Closed Source Parsers with QEMU and Dyninst</p>","children":[],"payload":{"lines":"1565,1567"}}],"payload":{"lines":"1559,1567"}},{"content":"\n<p data-lines=\"1567,1568\">Best Practices for High Performance Fuzzing</p>","children":[{"content":"\n<p data-lines=\"1569,1570\">System Configuration</p>","children":[],"payload":{"lines":"1569,1571"}},{"content":"\n<p data-lines=\"1571,1572\">Corpus Generation Techniques</p>","children":[],"payload":{"lines":"1571,1573"}},{"content":"\n<p data-lines=\"1573,1574\">Cross-Fuzzing Difficult Parsers</p>","children":[],"payload":{"lines":"1573,1575"}}],"payload":{"lines":"1567,1575"}},{"content":"\n<p data-lines=\"1575,1576\">Dynamic Binary Translation for Fuzzing and Triage</p>","children":[{"content":"\n<p data-lines=\"1577,1578\">Effectively Instrument Linux and Windows with Binary Translation</p>","children":[],"payload":{"lines":"1577,1579"}},{"content":"\n<p data-lines=\"1579,1580\">Introduction to Valgrind, Dr. Memory, and Address Sanitizer</p>","children":[],"payload":{"lines":"1579,1581"}},{"content":"\n<p data-lines=\"1581,1582\">Introduction to PIN, DynamoRIO, and Dyninst Internals</p>","children":[],"payload":{"lines":"1581,1583"}},{"content":"\n<p data-lines=\"1583,1584\">Identifying Hook Locations with Debuggers and DBI</p>","children":[],"payload":{"lines":"1583,1585"}},{"content":"\n<p data-lines=\"1585,1586\">Fuzzing Kernels and Other Architectures with QEMU</p>","children":[],"payload":{"lines":"1585,1587"}}],"payload":{"lines":"1575,1587"}},{"content":"\n<p data-lines=\"1587,1588\">Fuzzing Parsers with WinAFL</p>","children":[{"content":"\n<p data-lines=\"1589,1590\">Optimizing Harnesses for Exported APIs</p>","children":[],"payload":{"lines":"1589,1591"}},{"content":"\n<p data-lines=\"1591,1592\">Hooking Closed Source Command Line Applications</p>","children":[],"payload":{"lines":"1591,1593"}},{"content":"\n<p data-lines=\"1593,1594\">Deep Hooks Into Private Library Functions with Global State</p>","children":[],"payload":{"lines":"1593,1595"}},{"content":"\n<p data-lines=\"1595,1596\">Fuzzing Internal Data Streams in Complex OLE Objects</p>","children":[],"payload":{"lines":"1595,1597"}}],"payload":{"lines":"1587,1597"}},{"content":"\n<p data-lines=\"1597,1598\">Fuzzing Browsers with Evolutionary Grammar Fuzzing</p>","children":[{"content":"\n<p data-lines=\"1599,1600\">Understanding Grammars and Object Models</p>","children":[],"payload":{"lines":"1599,1601"}},{"content":"\n<p data-lines=\"1601,1602\">Fuzzing Object Models with Dynamic Grammar Fuzzing</p>","children":[],"payload":{"lines":"1601,1603"}},{"content":"\n<p data-lines=\"1603,1604\">Improving Grammar Fuzzers with Feedback Metrics</p>","children":[],"payload":{"lines":"1603,1605"}}],"payload":{"lines":"1597,1605"}},{"content":"\n<p data-lines=\"1605,1606\">Time Travel Debugging</p>","children":[{"content":"\n<p data-lines=\"1607,1608\">Introduction to Time Travel Debugging</p>","children":[],"payload":{"lines":"1607,1609"}},{"content":"\n<p data-lines=\"1609,1610\">Crash Analysis with Reverse Debugging on Linux</p>","children":[],"payload":{"lines":"1609,1611"}},{"content":"\n<p data-lines=\"1611,1612\">Crash Analysis with Reverse Debugging on Windows</p>","children":[],"payload":{"lines":"1611,1613"}}],"payload":{"lines":"1605,1613"}},{"content":"\n<p data-lines=\"1613,1614\">Taint Assisted Root Cause Analysis</p>","children":[{"content":"\n<p data-lines=\"1615,1616\">Introduction to Dynamic Taint Analysis</p>","children":[],"payload":{"lines":"1615,1617"}},{"content":"\n<p data-lines=\"1617,1618\">Taint Slicing for Root Cause Analysis</p>","children":[],"payload":{"lines":"1617,1619"}}],"payload":{"lines":"1613,1619"}},{"content":"\n<p data-lines=\"1619,1620\">Symbolic and Concolic Execution</p>","children":[{"content":"\n<p data-lines=\"1621,1622\">Introduction to Constraint Solving</p>","children":[],"payload":{"lines":"1621,1623"}},{"content":"\n<p data-lines=\"1623,1624\">Concolic Execution for Test Case Generation</p>","children":[],"payload":{"lines":"1623,1625"}},{"content":"\n<p data-lines=\"1625,1626\">Hybrid Fuzzing with Concolic Execution</p>","children":[],"payload":{"lines":"1625,1627"}}],"payload":{"lines":"1619,1627"}}],"payload":{"lines":"1545,1627"}}],"payload":{"lines":"1253,1627"}},{"content":"\n<p data-lines=\"1627,1628\">Windows</p>","children":[{"content":"\n<p data-lines=\"1629,1630\">Introduction</p>","children":[{"content":"\n<p data-lines=\"1631,1632\">Reverse Engineering</p>","children":[{"content":"\n<p data-lines=\"1633,1634\">WinDBG and Extensions</p>","children":[],"payload":{"lines":"1633,1635"}},{"content":"\n<p data-lines=\"1635,1636\">IDA Pro and Extensions</p>","children":[],"payload":{"lines":"1635,1637"}}],"payload":{"lines":"1631,1637"}},{"content":"\n<p data-lines=\"1637,1638\">GLibc Heap</p>","children":[{"content":"\n<p data-lines=\"1639,1640\">malloc_chunk</p>","children":[],"payload":{"lines":"1639,1641"}},{"content":"\n<p data-lines=\"1641,1642\">malloc_state</p>","children":[],"payload":{"lines":"1641,1643"}},{"content":"\n<p data-lines=\"1643,1644\">Bins and Chunks</p>","children":[],"payload":{"lines":"1643,1645"}},{"content":"\n<p data-lines=\"1645,1646\">Internal Functions</p>","children":[],"payload":{"lines":"1645,1647"}},{"content":"\n<p data-lines=\"1647,1648\">Core Functions</p>","children":[],"payload":{"lines":"1647,1649"}},{"content":"\n<p data-lines=\"1649,1650\">Security Checks</p>","children":[],"payload":{"lines":"1649,1651"}}],"payload":{"lines":"1637,1651"}}],"payload":{"lines":"1629,1651"}},{"content":"\n<p data-lines=\"1651,1652\">Vulnerabilities</p>","children":[{"content":"\n<p data-lines=\"1653,1654\">Stack Overflow</p>","children":[{"content":"\n<p data-lines=\"1655,1656\">Buffer Overflow</p>","children":[],"payload":{"lines":"1655,1657"}},{"content":"\n<p data-lines=\"1657,1658\">Buffer Underflow</p>","children":[],"payload":{"lines":"1657,1659"}},{"content":"\n<p data-lines=\"1659,1660\">Exploiting SEH Overflows</p>","children":[],"payload":{"lines":"1659,1661"}},{"content":"\n<p data-lines=\"1661,1662\">Linear SEH Record Overwrite</p>","children":[],"payload":{"lines":"1661,1663"}},{"content":"\n<p data-lines=\"1663,1664\">Linear Return Address Overwrite</p>","children":[],"payload":{"lines":"1663,1665"}},{"content":"\n<p data-lines=\"1665,1666\">Linear Local Variable Overwrite</p>","children":[],"payload":{"lines":"1665,1667"}},{"content":"\n<p data-lines=\"1667,1668\">Linear Parameter Overwrite</p>","children":[],"payload":{"lines":"1667,1669"}},{"content":"\n<p data-lines=\"1669,1670\">Non-Linear/Backward Overwrites</p>","children":[],"payload":{"lines":"1669,1671"}}],"payload":{"lines":"1653,1671"}},{"content":"\n<p data-lines=\"1671,1672\">Integer Overflow</p>","children":[{"content":"\n<p data-lines=\"1673,1674\">Buffer Overflow</p>","children":[],"payload":{"lines":"1673,1675"}},{"content":"\n<p data-lines=\"1675,1676\">Buffer Underflow</p>","children":[],"payload":{"lines":"1675,1677"}},{"content":"\n<p data-lines=\"1677,1678\">Widthness Overflows</p>","children":[],"payload":{"lines":"1677,1679"}},{"content":"\n<p data-lines=\"1679,1680\">Arithmetic Overflows</p>","children":[],"payload":{"lines":"1679,1681"}},{"content":"\n<p data-lines=\"1681,1682\">Signedness Bugs</p>","children":[],"payload":{"lines":"1681,1683"}}],"payload":{"lines":"1671,1683"}},{"content":"\n<p data-lines=\"1683,1684\">Heap Overflow</p>","children":[{"content":"\n<p data-lines=\"1685,1686\">Buffer Overflow</p>","children":[],"payload":{"lines":"1685,1687"}},{"content":"\n<p data-lines=\"1687,1688\">Buffer Underflow</p>","children":[],"payload":{"lines":"1687,1689"}},{"content":"\n<p data-lines=\"1689,1690\">Tcache Dup</p>","children":[],"payload":{"lines":"1689,1691"}},{"content":"\n<p data-lines=\"1691,1692\">Fastbin Dup</p>","children":[],"payload":{"lines":"1691,1693"}},{"content":"\n<p data-lines=\"1693,1694\">Poison Null Byte</p>","children":[],"payload":{"lines":"1693,1695"}},{"content":"\n<p data-lines=\"1695,1696\">House of Orange</p>","children":[],"payload":{"lines":"1695,1697"}},{"content":"\n<p data-lines=\"1697,1698\">House of Corrosion</p>","children":[],"payload":{"lines":"1697,1699"}},{"content":"\n<p data-lines=\"1699,1700\">House of Spirit</p>","children":[],"payload":{"lines":"1699,1701"}},{"content":"\n<p data-lines=\"1701,1702\">House of Lore</p>","children":[],"payload":{"lines":"1701,1703"}},{"content":"\n<p data-lines=\"1703,1704\">House of Force</p>","children":[],"payload":{"lines":"1703,1705"}},{"content":"\n<p data-lines=\"1705,1706\">House of Einherjar</p>","children":[],"payload":{"lines":"1705,1707"}},{"content":"\n<p data-lines=\"1707,1708\">House of Rabbit</p>","children":[],"payload":{"lines":"1707,1709"}},{"content":"\n<p data-lines=\"1709,1710\">Marauder's mmap</p>","children":[],"payload":{"lines":"1709,1711"}},{"content":"\n<p data-lines=\"1711,1712\">Single-Byte</p>","children":[],"payload":{"lines":"1711,1713"}},{"content":"\n<p data-lines=\"1713,1714\">One-Byte</p>","children":[],"payload":{"lines":"1713,1715"}}],"payload":{"lines":"1683,1715"}},{"content":"\n<p data-lines=\"1715,1716\">Use After Free</p>","children":[{"content":"\n<p data-lines=\"1717,1718\">First Fit</p>","children":[],"payload":{"lines":"1717,1719"}},{"content":"\n<p data-lines=\"1719,1720\">Double Free</p>","children":[],"payload":{"lines":"1719,1721"}},{"content":"\n<p data-lines=\"1721,1722\">Forging Chunks</p>","children":[],"payload":{"lines":"1721,1723"}},{"content":"\n<p data-lines=\"1723,1724\">Shrinking Free Chunks</p>","children":[],"payload":{"lines":"1723,1725"}},{"content":"\n<p data-lines=\"1725,1726\">Safe Linking</p>","children":[],"payload":{"lines":"1725,1727"}},{"content":"\n<p data-lines=\"1727,1728\">Unsafe Unlink</p>","children":[],"payload":{"lines":"1727,1729"}}],"payload":{"lines":"1715,1729"}},{"content":"\n<p data-lines=\"1729,1730\">Format String</p>","children":[{"content":"\n<p data-lines=\"1731,1732\">Format Functions</p>","children":[],"payload":{"lines":"1731,1733"}},{"content":"\n<p data-lines=\"1733,1734\">Viewing Process Memory</p>","children":[],"payload":{"lines":"1733,1735"}},{"content":"\n<p data-lines=\"1735,1736\">Overwriting Arbitrary Memory</p>","children":[],"payload":{"lines":"1735,1737"}},{"content":"\n<p data-lines=\"1737,1738\">Variations of Exploitation</p>","children":[],"payload":{"lines":"1737,1739"}},{"content":"\n<p data-lines=\"1739,1740\">Brute Forcing</p>","children":[],"payload":{"lines":"1739,1741"}}],"payload":{"lines":"1729,1741"}},{"content":"\n<p data-lines=\"1741,1742\">Null Dereference</p>","children":[{"content":"\n<p data-lines=\"1743,1744\">Nullable Types</p>","children":[],"payload":{"lines":"1743,1745"}},{"content":"\n<p data-lines=\"1745,1746\">Uninitialized Pointer</p>","children":[],"payload":{"lines":"1745,1747"}},{"content":"\n<p data-lines=\"1747,1748\">Expired Pointer Dereference</p>","children":[],"payload":{"lines":"1747,1749"}}],"payload":{"lines":"1741,1749"}},{"content":"\n<p data-lines=\"1749,1750\">Out-of-Bounds</p>","children":[{"content":"\n<p data-lines=\"1751,1752\">Read</p>","children":[],"payload":{"lines":"1751,1753"}},{"content":"\n<p data-lines=\"1753,1754\">Write</p>","children":[],"payload":{"lines":"1753,1755"}}],"payload":{"lines":"1749,1755"}},{"content":"\n<p data-lines=\"1755,1756\">Type Confusion</p>","children":[{"content":"\n<p data-lines=\"1757,1758\">Static Casting</p>","children":[],"payload":{"lines":"1757,1759"}},{"content":"\n<p data-lines=\"1759,1760\">Dynamic Casting</p>","children":[],"payload":{"lines":"1759,1761"}},{"content":"\n<p data-lines=\"1761,1762\">C-style Casting</p>","children":[],"payload":{"lines":"1761,1763"}}],"payload":{"lines":"1755,1763"}}],"payload":{"lines":"1651,1763"}},{"content":"\n<p data-lines=\"1763,1764\">Bypass Mitigations</p>","children":[{"content":"\n<p data-lines=\"1765,1766\">SafeSEH/SEHOP</p>","children":[{"content":"\n<p data-lines=\"1767,1768\">Module Not SafeSEH Protected</p>","children":[],"payload":{"lines":"1767,1769"}},{"content":"\n<p data-lines=\"1769,1770\">Recreate SEH Chain</p>","children":[],"payload":{"lines":"1769,1771"}}],"payload":{"lines":"1765,1771"}},{"content":"\n<p data-lines=\"1771,1772\">Stack Canary/Guard</p>","children":[{"content":"\n<p data-lines=\"1773,1774\">Brute Force Attack</p>","children":[],"payload":{"lines":"1773,1775"}},{"content":"\n<p data-lines=\"1775,1776\">Data Leaking</p>","children":[],"payload":{"lines":"1775,1777"}}],"payload":{"lines":"1771,1777"}},{"content":"\n<p data-lines=\"1777,1778\">DEP/NX</p>","children":[{"content":"\n<p data-lines=\"1779,1780\">Egg Hunters</p>","children":[],"payload":{"lines":"1779,1781"}},{"content":"\n<p data-lines=\"1781,1782\">Return2Library</p>","children":[],"payload":{"lines":"1781,1783"}},{"content":"\n<p data-lines=\"1783,1784\">RET2ESP</p>","children":[],"payload":{"lines":"1783,1785"}},{"content":"\n<p data-lines=\"1785,1786\">Return2CSU</p>","children":[],"payload":{"lines":"1785,1787"}},{"content":"\n<p data-lines=\"1787,1788\">Return Oriented Programming</p>","children":[],"payload":{"lines":"1787,1789"}},{"content":"\n<p data-lines=\"1789,1790\">Jump Oriented Programming</p>","children":[],"payload":{"lines":"1789,1791"}},{"content":"\n<p data-lines=\"1791,1792\">Data Oriented Programming</p>","children":[],"payload":{"lines":"1791,1793"}},{"content":"\n<p data-lines=\"1793,1794\">String Oriented Programming</p>","children":[],"payload":{"lines":"1793,1795"}},{"content":"\n<p data-lines=\"1795,1796\">Pure Call Oriented Programming</p>","children":[],"payload":{"lines":"1795,1797"}},{"content":"\n<p data-lines=\"1797,1798\">Blind Return Oriented Programming</p>","children":[],"payload":{"lines":"1797,1799"}},{"content":"\n<p data-lines=\"1799,1800\">Stack Pivoting</p>","children":[],"payload":{"lines":"1799,1801"}}],"payload":{"lines":"1777,1801"}},{"content":"\n<p data-lines=\"1801,1802\">ASLR</p>","children":[{"content":"\n<p data-lines=\"1803,1804\">Egg Hunters</p>","children":[],"payload":{"lines":"1803,1805"}},{"content":"\n<p data-lines=\"1805,1806\">Return2Library</p>","children":[],"payload":{"lines":"1805,1807"}},{"content":"\n<p data-lines=\"1807,1808\">RET2ESP</p>","children":[],"payload":{"lines":"1807,1809"}},{"content":"\n<p data-lines=\"1809,1810\">RET2REG</p>","children":[],"payload":{"lines":"1809,1811"}},{"content":"\n<p data-lines=\"1811,1812\">Return2CSU</p>","children":[],"payload":{"lines":"1811,1813"}},{"content":"\n<p data-lines=\"1813,1814\">Return Oriented Programming</p>","children":[],"payload":{"lines":"1813,1815"}},{"content":"\n<p data-lines=\"1815,1816\">Jump Oriented Programming</p>","children":[],"payload":{"lines":"1815,1817"}},{"content":"\n<p data-lines=\"1817,1818\">Data Oriented Programming</p>","children":[],"payload":{"lines":"1817,1819"}},{"content":"\n<p data-lines=\"1819,1820\">String Oriented Programming</p>","children":[],"payload":{"lines":"1819,1821"}},{"content":"\n<p data-lines=\"1821,1822\">Pure Call Oriented Programming</p>","children":[],"payload":{"lines":"1821,1823"}},{"content":"\n<p data-lines=\"1823,1824\">Blind Return Oriented Programming</p>","children":[],"payload":{"lines":"1823,1825"}},{"content":"\n<p data-lines=\"1825,1826\">Stack Pivoting</p>","children":[],"payload":{"lines":"1825,1827"}},{"content":"\n<p data-lines=\"1827,1828\">JIT Spraying</p>","children":[],"payload":{"lines":"1827,1829"}},{"content":"\n<p data-lines=\"1829,1830\">Heap Spraying</p>","children":[],"payload":{"lines":"1829,1831"}},{"content":"\n<p data-lines=\"1831,1832\">Heap Feng Shui</p>","children":[],"payload":{"lines":"1831,1833"}},{"content":"\n<p data-lines=\"1833,1834\">JIT-Return Oriented Programming</p>","children":[],"payload":{"lines":"1833,1835"}},{"content":"\n<p data-lines=\"1835,1836\">Info Leak</p>","children":[],"payload":{"lines":"1835,1837"}},{"content":"\n<p data-lines=\"1837,1838\">Brute Force Attack</p>","children":[],"payload":{"lines":"1837,1839"}},{"content":"\n<p data-lines=\"1839,1840\">Blindside Attack</p>","children":[],"payload":{"lines":"1839,1841"}},{"content":"\n<p data-lines=\"1841,1842\">Return2dlResolve</p>","children":[],"payload":{"lines":"1841,1843"}}],"payload":{"lines":"1801,1843"}},{"content":"\n<p data-lines=\"1843,1844\">CFI/CFG/RFG/CPI/CPS/CET</p>","children":[{"content":"\n<p data-lines=\"1845,1846\">Loop Oriented Programming</p>","children":[],"payload":{"lines":"1845,1847"}},{"content":"\n<p data-lines=\"1847,1848\">Block Oriented Programming</p>","children":[],"payload":{"lines":"1847,1849"}},{"content":"\n<p data-lines=\"1849,1850\">Data Oriented Programming</p>","children":[],"payload":{"lines":"1849,1851"}},{"content":"\n<p data-lines=\"1851,1852\">Counterfeit Object-Oriented Programming</p>","children":[],"payload":{"lines":"1851,1853"}},{"content":"\n<p data-lines=\"1853,1854\">Non-CFG Module (Unprotected Indirect Call)</p>","children":[],"payload":{"lines":"1853,1855"}},{"content":"\n<p data-lines=\"1855,1856\">Chakra’s JIT Compiler</p>","children":[],"payload":{"lines":"1855,1857"}},{"content":"\n<p data-lines=\"1857,1858\">Corrupting Stack-Spilled Registers</p>","children":[],"payload":{"lines":"1857,1859"}},{"content":"\n<p data-lines=\"1859,1860\">Corrupting Return Address</p>","children":[],"payload":{"lines":"1859,1861"}}],"payload":{"lines":"1843,1861"}}],"payload":{"lines":"1763,1861"}},{"content":"\n<p data-lines=\"1861,1862\">Shellcode Development</p>","children":[{"content":"\n<p data-lines=\"1863,1864\">Windows 32-bit Memory Layout</p>","children":[],"payload":{"lines":"1863,1865"}},{"content":"\n<p data-lines=\"1865,1866\">Windows 64-bit Memory Layout and ASLR</p>","children":[],"payload":{"lines":"1865,1867"}},{"content":"\n<p data-lines=\"1867,1868\">Windows Library Layout – Real Limits</p>","children":[],"payload":{"lines":"1867,1869"}},{"content":"\n<p data-lines=\"1869,1870\">Windows Shellcoding Techniques</p>","children":[],"payload":{"lines":"1869,1871"}},{"content":"\n<p data-lines=\"1871,1872\">Windows Shellcoding - 32-bit vs 64-bit</p>","children":[],"payload":{"lines":"1871,1873"}},{"content":"\n<p data-lines=\"1873,1874\">Locating memory addresses of functions in Windows DLLs</p>","children":[],"payload":{"lines":"1873,1875"}},{"content":"\n<p data-lines=\"1875,1876\">Debugging Windows Shellcode using various debuggers</p>","children":[],"payload":{"lines":"1875,1877"}},{"content":"\n<p data-lines=\"1877,1878\">Windows Shellcode Function Call Techniques</p>","children":[],"payload":{"lines":"1877,1879"}},{"content":"\n<p data-lines=\"1879,1880\">Windows Shellcode to Dynamically Locate Kernel32.dll</p>","children":[],"payload":{"lines":"1879,1881"}},{"content":"\n<p data-lines=\"1881,1882\">Windows 64-bit Command Exec Shellcode</p>","children":[],"payload":{"lines":"1881,1883"}},{"content":"\n<p data-lines=\"1883,1884\">Converting 32-bit Shellcode to 64-bit Shellcode</p>","children":[],"payload":{"lines":"1883,1885"}},{"content":"\n<p data-lines=\"1885,1886\">Windows Shellcode Networking</p>","children":[],"payload":{"lines":"1885,1887"}},{"content":"\n<p data-lines=\"1887,1888\">Connect Back Shellcode</p>","children":[],"payload":{"lines":"1887,1889"}},{"content":"\n<p data-lines=\"1889,1890\">Develop Connect Back Shellcode</p>","children":[],"payload":{"lines":"1889,1891"}},{"content":"\n<p data-lines=\"1891,1892\">Egg Hunter Shellcode</p>","children":[],"payload":{"lines":"1891,1893"}},{"content":"\n<p data-lines=\"1893,1894\">Windows System Calls</p>","children":[],"payload":{"lines":"1893,1895"}},{"content":"\n<p data-lines=\"1895,1896\">Implement your own Egg Hunter</p>","children":[],"payload":{"lines":"1895,1897"}},{"content":"\n<p data-lines=\"1897,1898\">Reviewing Public Exploits for Malicious Shellcode</p>","children":[],"payload":{"lines":"1897,1899"}},{"content":"\n<p data-lines=\"1899,1900\">Modifying Shellcode to Fit Into Exploits</p>","children":[],"payload":{"lines":"1899,1901"}},{"content":"\n<p data-lines=\"1901,1902\">Encoding Shellcode to Work In Exploits</p>","children":[],"payload":{"lines":"1901,1903"}},{"content":"\n<p data-lines=\"1903,1904\">Exploitation Using Your Custom Shellcode</p>","children":[],"payload":{"lines":"1903,1905"}},{"content":"\n<p data-lines=\"1905,1906\">Creating Metasploit Payload Modules</p>","children":[],"payload":{"lines":"1905,1907"}},{"content":"\n<p data-lines=\"1907,1908\">Integrating Shellcode into Metasploit</p>","children":[],"payload":{"lines":"1907,1909"}},{"content":"\n<p data-lines=\"1909,1910\">Staged Loading Shellcode</p>","children":[],"payload":{"lines":"1909,1911"}},{"content":"\n<p data-lines=\"1911,1912\">Protocol Tunnelling Shellcode</p>","children":[],"payload":{"lines":"1911,1913"}},{"content":"\n<p data-lines=\"1913,1914\">Kernel Level Shellcode</p>","children":[],"payload":{"lines":"1913,1915"}}],"payload":{"lines":"1861,1915"}},{"content":"\n<p data-lines=\"1915,1916\">Fuzzing and Crash Analysis</p>","children":[{"content":"\n<p data-lines=\"1917,1918\">Analysis of Generational and Mutational Fuzzing</p>","children":[{"content":"\n<p data-lines=\"1919,1920\">Attack Surface Analysis</p>","children":[],"payload":{"lines":"1919,1921"}},{"content":"\n<p data-lines=\"1921,1922\">Effective Mutation Engines</p>","children":[],"payload":{"lines":"1921,1923"}},{"content":"\n<p data-lines=\"1923,1924\">Effective Corpus Generation</p>","children":[],"payload":{"lines":"1923,1925"}},{"content":"\n<p data-lines=\"1925,1926\">Protocol and File Format Grammars</p>","children":[],"payload":{"lines":"1925,1927"}},{"content":"\n<p data-lines=\"1927,1928\">Crash Detection</p>","children":[],"payload":{"lines":"1927,1929"}}],"payload":{"lines":"1917,1929"}},{"content":"\n<p data-lines=\"1929,1930\">Fuzzing File and Network Parsers with Coverage Guided Fuzzing</p>","children":[{"content":"\n<p data-lines=\"1931,1932\">Fuzz any Windows Package with AFL</p>","children":[],"payload":{"lines":"1931,1933"}},{"content":"\n<p data-lines=\"1933,1934\">Modifying Targets and Writing Harnesses with LibFuzzer</p>","children":[],"payload":{"lines":"1933,1935"}},{"content":"\n<p data-lines=\"1935,1936\">Fuzzing Closed Source Parsers with QEMU and Dyninst</p>","children":[],"payload":{"lines":"1935,1937"}}],"payload":{"lines":"1929,1937"}},{"content":"\n<p data-lines=\"1937,1938\">Best Practices for High Performance Fuzzing</p>","children":[{"content":"\n<p data-lines=\"1939,1940\">System Configuration</p>","children":[],"payload":{"lines":"1939,1941"}},{"content":"\n<p data-lines=\"1941,1942\">Corpus Generation Techniques</p>","children":[],"payload":{"lines":"1941,1943"}},{"content":"\n<p data-lines=\"1943,1944\">Cross-Fuzzing Difficult Parsers</p>","children":[],"payload":{"lines":"1943,1945"}}],"payload":{"lines":"1937,1945"}},{"content":"\n<p data-lines=\"1945,1946\">Dynamic Binary Translation for Fuzzing and Triage</p>","children":[{"content":"\n<p data-lines=\"1947,1948\">Effectively Instrument Linux and Windows with Binary Translation</p>","children":[],"payload":{"lines":"1947,1949"}},{"content":"\n<p data-lines=\"1949,1950\">Introduction to Valgrind, Dr. Memory, and Address Sanitizer</p>","children":[],"payload":{"lines":"1949,1951"}},{"content":"\n<p data-lines=\"1951,1952\">Introduction to PIN, DynamoRIO, and Dyninst Internals</p>","children":[],"payload":{"lines":"1951,1953"}},{"content":"\n<p data-lines=\"1953,1954\">Identifying Hook Locations with Debuggers and DBI</p>","children":[],"payload":{"lines":"1953,1955"}},{"content":"\n<p data-lines=\"1955,1956\">Fuzzing Kernels and Other Architectures with QEMU</p>","children":[],"payload":{"lines":"1955,1957"}}],"payload":{"lines":"1945,1957"}},{"content":"\n<p data-lines=\"1957,1958\">Fuzzing Parsers with WinAFL</p>","children":[{"content":"\n<p data-lines=\"1959,1960\">Optimizing Harnesses for Exported APIs</p>","children":[],"payload":{"lines":"1959,1961"}},{"content":"\n<p data-lines=\"1961,1962\">Hooking Closed Source Command Line Applications</p>","children":[],"payload":{"lines":"1961,1963"}},{"content":"\n<p data-lines=\"1963,1964\">Deep Hooks Into Private Library Functions with Global State</p>","children":[],"payload":{"lines":"1963,1965"}},{"content":"\n<p data-lines=\"1965,1966\">Fuzzing Internal Data Streams in Complex OLE Objects</p>","children":[],"payload":{"lines":"1965,1967"}}],"payload":{"lines":"1957,1967"}},{"content":"\n<p data-lines=\"1967,1968\">Fuzzing Browsers with Evolutionary Grammar Fuzzing</p>","children":[{"content":"\n<p data-lines=\"1969,1970\">Understanding Grammars and Object Models</p>","children":[],"payload":{"lines":"1969,1971"}},{"content":"\n<p data-lines=\"1971,1972\">Fuzzing Object Models with Dynamic Grammar Fuzzing</p>","children":[],"payload":{"lines":"1971,1973"}},{"content":"\n<p data-lines=\"1973,1974\">Improving Grammar Fuzzers with Feedback Metrics</p>","children":[],"payload":{"lines":"1973,1975"}}],"payload":{"lines":"1967,1975"}},{"content":"\n<p data-lines=\"1975,1976\">Time Travel Debugging</p>","children":[{"content":"\n<p data-lines=\"1977,1978\">Introduction to Time Travel Debugging</p>","children":[],"payload":{"lines":"1977,1979"}},{"content":"\n<p data-lines=\"1979,1980\">Crash Analysis with Reverse Debugging on Linux</p>","children":[],"payload":{"lines":"1979,1981"}},{"content":"\n<p data-lines=\"1981,1982\">Crash Analysis with Reverse Debugging on Windows</p>","children":[],"payload":{"lines":"1981,1983"}}],"payload":{"lines":"1975,1983"}},{"content":"\n<p data-lines=\"1983,1984\">Taint Assisted Root Cause Analysis</p>","children":[{"content":"\n<p data-lines=\"1985,1986\">Introduction to Dynamic Taint Analysis</p>","children":[],"payload":{"lines":"1985,1987"}},{"content":"\n<p data-lines=\"1987,1988\">Taint Slicing for Root Cause Analysis</p>","children":[],"payload":{"lines":"1987,1989"}}],"payload":{"lines":"1983,1989"}},{"content":"\n<p data-lines=\"1989,1990\">Symbolic and Concolic Execution</p>","children":[{"content":"\n<p data-lines=\"1991,1992\">Introduction to Constraint Solving</p>","children":[],"payload":{"lines":"1991,1993"}},{"content":"\n<p data-lines=\"1993,1994\">Concolic Execution for Test Case Generation</p>","children":[],"payload":{"lines":"1993,1995"}},{"content":"\n<p data-lines=\"1995,1996\">Hybrid Fuzzing with Concolic Execution</p>","children":[],"payload":{"lines":"1995,1997"}}],"payload":{"lines":"1989,1997"}}],"payload":{"lines":"1915,1997"}}],"payload":{"lines":"1627,1997"}}],"payload":{"lines":"1251,1997"}},{"content":"\n<p data-lines=\"1997,1998\">Exploitation of Remote Services (Kernel-Mode)</p>","children":[{"content":"\n<p data-lines=\"1999,2000\">Linux</p>","children":[{"content":"\n<p data-lines=\"2001,2002\">Introduction</p>","children":[{"content":"\n<p data-lines=\"2003,2004\">User-Space vs Kernel-Space</p>","children":[],"payload":{"lines":"2003,2005"}},{"content":"\n<p data-lines=\"2005,2006\">x86/x64 Architecture</p>","children":[],"payload":{"lines":"2005,2007"}},{"content":"\n<p data-lines=\"2007,2008\">User-Space Processes</p>","children":[],"payload":{"lines":"2007,2009"}},{"content":"\n<p data-lines=\"2009,2010\">Virtual Memory Management</p>","children":[],"payload":{"lines":"2009,2011"}},{"content":"\n<p data-lines=\"2011,2012\">Linux Privileges Model</p>","children":[],"payload":{"lines":"2011,2013"}}],"payload":{"lines":"2001,2013"}},{"content":"\n<p data-lines=\"2013,2014\">Setting up the Debugging ENV</p>","children":[{"content":"\n<p data-lines=\"2015,2016\">Kernel Debugging Techniques</p>","children":[],"payload":{"lines":"2015,2017"}},{"content":"\n<p data-lines=\"2017,2018\">Remote Kernel Debugging with GDB</p>","children":[],"payload":{"lines":"2017,2019"}},{"content":"\n<p data-lines=\"2019,2020\">Module Debugging</p>","children":[],"payload":{"lines":"2019,2021"}}],"payload":{"lines":"2013,2021"}},{"content":"\n<p data-lines=\"2021,2022\">Privilege Escalation</p>","children":[{"content":"\n<p data-lines=\"2023,2024\">Modern Distributions</p>","children":[],"payload":{"lines":"2023,2025"}},{"content":"\n<p data-lines=\"2025,2026\">Heuristics</p>","children":[],"payload":{"lines":"2025,2027"}},{"content":"\n<p data-lines=\"2027,2028\">RET2USR Attacks</p>","children":[],"payload":{"lines":"2027,2029"}}],"payload":{"lines":"2021,2029"}},{"content":"\n<p data-lines=\"2029,2030\">Arbitrary Read/Write Primitives</p>","children":[{"content":"\n<p data-lines=\"2031,2032\">Interrupt Descriptor Table Overwrites</p>","children":[],"payload":{"lines":"2031,2033"}},{"content":"\n<p data-lines=\"2033,2034\">Triggering the Vulnerability</p>","children":[],"payload":{"lines":"2033,2035"}},{"content":"\n<p data-lines=\"2035,2036\">Recovering the Kernel State</p>","children":[],"payload":{"lines":"2035,2037"}}],"payload":{"lines":"2029,2037"}},{"content":"\n<p data-lines=\"2037,2038\">Information Disclosure</p>","children":[{"content":"\n<p data-lines=\"2039,2040\">Kernel Memory Addressing Disclosures</p>","children":[],"payload":{"lines":"2039,2041"}},{"content":"\n<p data-lines=\"2041,2042\">Memory Leaks and addr_limit User/Kernel Boundary</p>","children":[],"payload":{"lines":"2041,2043"}}],"payload":{"lines":"2037,2043"}},{"content":"\n<p data-lines=\"2043,2044\">Partially-Controlled and Uncontrolled Read/Write Primitives</p>","children":[],"payload":{"lines":"2043,2045"}},{"content":"\n<p data-lines=\"2045,2046\">Out of Bounds Access Vulnerabilities</p>","children":[],"payload":{"lines":"2045,2047"}},{"content":"\n<p data-lines=\"2047,2048\">Integer Vulnerabilities</p>","children":[{"content":"\n<p data-lines=\"2049,2050\">Signedness Issues</p>","children":[],"payload":{"lines":"2049,2051"}},{"content":"\n<p data-lines=\"2051,2052\">Integer Overflows</p>","children":[],"payload":{"lines":"2051,2053"}}],"payload":{"lines":"2047,2053"}},{"content":"\n<p data-lines=\"2053,2054\">Kernel Stack Overflows</p>","children":[],"payload":{"lines":"2053,2055"}},{"content":"\n<p data-lines=\"2055,2056\">Dynamic Memory Management/SLAB Allocator</p>","children":[{"content":"\n<p data-lines=\"2057,2058\">Generic SLAB Concepts</p>","children":[],"payload":{"lines":"2057,2059"}},{"content":"\n<p data-lines=\"2059,2060\">Linux SLUB Allocator</p>","children":[],"payload":{"lines":"2059,2061"}}],"payload":{"lines":"2055,2061"}},{"content":"\n<p data-lines=\"2061,2062\">Heap Vulnerabilities</p>","children":[{"content":"\n<p data-lines=\"2063,2064\">Use-After-Free Vulnerabilities</p>","children":[],"payload":{"lines":"2063,2065"}},{"content":"\n<p data-lines=\"2065,2066\">Overflowing into Adjacent Objects</p>","children":[],"payload":{"lines":"2065,2067"}},{"content":"\n<p data-lines=\"2067,2068\">Off-by-[one/X]</p>","children":[],"payload":{"lines":"2067,2069"}}],"payload":{"lines":"2061,2069"}},{"content":"\n<p data-lines=\"2069,2070\">Reliable UAF Exploitation on SMP Systems</p>","children":[],"payload":{"lines":"2069,2071"}},{"content":"\n<p data-lines=\"2071,2072\">Kernel Return-Oriented Programming</p>","children":[],"payload":{"lines":"2071,2073"}},{"content":"\n<p data-lines=\"2073,2074\">Bypassing Supervisor Mode Execution Protection</p>","children":[],"payload":{"lines":"2073,2075"}}],"payload":{"lines":"1999,2075"}},{"content":"\n<p data-lines=\"2075,2076\">Windows</p>","children":[{"content":"\n<p data-lines=\"2077,2078\">Windows Kernel Debugging</p>","children":[{"content":"\n<p data-lines=\"2079,2080\">Setup Kernel Debugging</p>","children":[],"payload":{"lines":"2079,2081"}},{"content":"\n<p data-lines=\"2081,2082\">Setup Debugging Symbols</p>","children":[],"payload":{"lines":"2081,2083"}},{"content":"\n<p data-lines=\"2083,2084\">WinDbg-Fu</p>","children":[],"payload":{"lines":"2083,2085"}}],"payload":{"lines":"2077,2085"}},{"content":"\n<p data-lines=\"2085,2086\">Windows Internals</p>","children":[{"content":"\n<p data-lines=\"2087,2088\">Windows NT Architecture</p>","children":[],"payload":{"lines":"2087,2089"}},{"content":"\n<p data-lines=\"2089,2090\">Executive & Kernel</p>","children":[],"payload":{"lines":"2089,2091"}},{"content":"\n<p data-lines=\"2091,2092\">Hardware Abstraction Layer (HAL)</p>","children":[],"payload":{"lines":"2091,2093"}},{"content":"\n<p data-lines=\"2093,2094\">Privilege Rings</p>","children":[],"payload":{"lines":"2093,2095"}},{"content":"\n<p data-lines=\"2095,2096\">Key Data Structures</p>","children":[],"payload":{"lines":"2095,2097"}}],"payload":{"lines":"2085,2097"}},{"content":"\n<p data-lines=\"2097,2098\">Memory Management</p>","children":[{"content":"\n<p data-lines=\"2099,2100\">Virtual Address Space</p>","children":[],"payload":{"lines":"2099,2101"}},{"content":"\n<p data-lines=\"2101,2102\">Memory Pool & Pool Allocator</p>","children":[],"payload":{"lines":"2101,2103"}}],"payload":{"lines":"2097,2103"}},{"content":"\n<p data-lines=\"2103,2104\">Windows Driver Basics</p>","children":[{"content":"\n<p data-lines=\"2105,2106\">I/O Request Packet (IRP)</p>","children":[],"payload":{"lines":"2105,2107"}},{"content":"\n<p data-lines=\"2107,2108\">I/O Control Code (IOCTL)</p>","children":[],"payload":{"lines":"2107,2109"}},{"content":"\n<p data-lines=\"2109,2110\">Data Buffering (Buffered I/O, Direct I/O, Neither Buffered Nor Direct I/O)</p>","children":[],"payload":{"lines":"2109,2111"}}],"payload":{"lines":"2103,2111"}},{"content":"\n<p data-lines=\"2111,2112\">Fuzzing Windows Drivers</p>","children":[{"content":"\n<p data-lines=\"2113,2114\">Locating IOCTLs in Windows Drivers</p>","children":[],"payload":{"lines":"2113,2115"}},{"content":"\n<p data-lines=\"2115,2116\">Locating Input Entry Points</p>","children":[],"payload":{"lines":"2115,2117"}},{"content":"\n<p data-lines=\"2117,2118\">Writing Scripts to Fuzz the Discovered IOCTLs</p>","children":[],"payload":{"lines":"2117,2119"}},{"content":"\n<p data-lines=\"2119,2120\">Playing with Public Fuzzers</p>","children":[],"payload":{"lines":"2119,2121"}}],"payload":{"lines":"2111,2121"}},{"content":"\n<p data-lines=\"2121,2122\">Exploitation</p>","children":[{"content":"\n<p data-lines=\"2123,2124\">Stack Buffer Overflow (SMEP & KPTI Enabled)</p>","children":[{"content":"\n<p data-lines=\"2125,2126\">Understand the Vulnerability</p>","children":[],"payload":{"lines":"2125,2127"}},{"content":"\n<p data-lines=\"2127,2128\">Achieving Code Execution</p>","children":[],"payload":{"lines":"2127,2129"}}],"payload":{"lines":"2123,2129"}},{"content":"\n<p data-lines=\"2129,2130\">Arbitrary Memory Overwrite</p>","children":[],"payload":{"lines":"2129,2131"}},{"content":"\n<p data-lines=\"2131,2132\">Memory Disclosure</p>","children":[{"content":"\n<p data-lines=\"2133,2134\">Understand the Vulnerability</p>","children":[],"payload":{"lines":"2133,2135"}},{"content":"\n<p data-lines=\"2135,2136\">Leak Function Pointer</p>","children":[],"payload":{"lines":"2135,2137"}},{"content":"\n<p data-lines=\"2137,2138\">Calculate Driver Base Address</p>","children":[],"payload":{"lines":"2137,2139"}}],"payload":{"lines":"2131,2139"}},{"content":"\n<p data-lines=\"2139,2140\">Pool Overflow</p>","children":[{"content":"\n<p data-lines=\"2141,2142\">Understand the Vulnerability</p>","children":[],"payload":{"lines":"2141,2143"}},{"content":"\n<p data-lines=\"2143,2144\">Finding Corruption Target</p>","children":[],"payload":{"lines":"2143,2145"}},{"content":"\n<p data-lines=\"2145,2146\">Grooming Target Pool</p>","children":[],"payload":{"lines":"2145,2147"}},{"content":"\n<p data-lines=\"2147,2148\">Achieving Arbitrary Read/Write Primitive (data-only attack)</p>","children":[],"payload":{"lines":"2147,2149"}},{"content":"\n<p data-lines=\"2149,2150\">Gaining local privilege escalation</p>","children":[],"payload":{"lines":"2149,2151"}}],"payload":{"lines":"2139,2151"}},{"content":"\n<p data-lines=\"2151,2152\">Achieving Arbitrary Read/Write Primitive (data-only attack)</p>","children":[],"payload":{"lines":"2151,2153"}}],"payload":{"lines":"2121,2153"}},{"content":"\n<p data-lines=\"2153,2154\">Kernel Payload</p>","children":[{"content":"\n<p data-lines=\"2155,2156\">Escalate Privilege of a Process from Kernel Debugger</p>","children":[],"payload":{"lines":"2155,2157"}},{"content":"\n<p data-lines=\"2157,2158\">Considerations while writing Escalation of Privilege Payload</p>","children":[],"payload":{"lines":"2157,2159"}},{"content":"\n<p data-lines=\"2159,2160\">Kernel Recovery (Fixating Kernel State After Exploitation)</p>","children":[],"payload":{"lines":"2159,2161"}}],"payload":{"lines":"2153,2161"}},{"content":"\n<p data-lines=\"2161,2162\">Exploit Mitigations</p>","children":[{"content":"\n<p data-lines=\"2163,2164\">Kernel Address Space Layout Randomization (kASLR)</p>","children":[],"payload":{"lines":"2163,2165"}},{"content":"\n<p data-lines=\"2165,2166\">Supervisor Mode Execution Prevention (SMEP)</p>","children":[],"payload":{"lines":"2165,2167"}},{"content":"\n<p data-lines=\"2167,2168\">Kernel Page Table Isolation (KPTI/KVA Shadow)</p>","children":[],"payload":{"lines":"2167,2169"}}],"payload":{"lines":"2161,2169"}},{"content":"\n<p data-lines=\"2169,2170\">Pool Manager</p>","children":[{"content":"\n<p data-lines=\"2171,2172\">Internals (kLFH)</p>","children":[],"payload":{"lines":"2171,2173"}},{"content":"\n<p data-lines=\"2173,2174\">Feng-Shui</p>","children":[],"payload":{"lines":"2173,2175"}}],"payload":{"lines":"2169,2175"}}],"payload":{"lines":"2075,2175"}}],"payload":{"lines":"1997,2175"}}],"payload":{"lines":"967,2175"}}],"payload":{"lines":"953,2175"}},{"content":"\n<p data-lines=\"2175,2176\">Wireless</p>","children":[{"content":"\n<p data-lines=\"2177,2178\">Prerequisites</p>","children":[{"content":"\n<p data-lines=\"2179,2180\">Basics of Network</p>","children":[],"payload":{"lines":"2179,2181"}},{"content":"\n<p data-lines=\"2181,2182\">Basics of Telecom</p>","children":[],"payload":{"lines":"2181,2183"}},{"content":"\n<p data-lines=\"2183,2184\">Basics of Linux</p>","children":[],"payload":{"lines":"2183,2185"}},{"content":"\n<p data-lines=\"2185,2186\">Basics of C/C++</p>","children":[],"payload":{"lines":"2185,2187"}},{"content":"\n<p data-lines=\"2187,2188\">Professional Python</p>","children":[],"payload":{"lines":"2187,2189"}}],"payload":{"lines":"2177,2189"}},{"content":"\n<p data-lines=\"2189,2190\">Syllabus</p>","children":[{"content":"\n<p data-lines=\"2191,2192\">Introduction</p>","children":[{"content":"\n<p data-lines=\"2193,2194\">Frequency Counter</p>","children":[],"payload":{"lines":"2193,2195"}},{"content":"\n<p data-lines=\"2195,2196\">Frequency Scanner</p>","children":[],"payload":{"lines":"2195,2197"}},{"content":"\n<p data-lines=\"2197,2198\">Spectrum Analyzer</p>","children":[],"payload":{"lines":"2197,2199"}},{"content":"\n<p data-lines=\"2199,2200\">802.11 USB adapter</p>","children":[],"payload":{"lines":"2199,2201"}},{"content":"\n<p data-lines=\"2201,2202\">External Antennas</p>","children":[],"payload":{"lines":"2201,2203"}},{"content":"\n<p data-lines=\"2203,2204\">USB GPS</p>","children":[],"payload":{"lines":"2203,2205"}},{"content":"\n<p data-lines=\"2205,2206\">GSM Protocol</p>","children":[],"payload":{"lines":"2205,2207"}},{"content":"\n<p data-lines=\"2207,2208\">3G Protocol</p>","children":[],"payload":{"lines":"2207,2209"}},{"content":"\n<p data-lines=\"2209,2210\">4G Protocol</p>","children":[],"payload":{"lines":"2209,2211"}},{"content":"\n<p data-lines=\"2211,2212\">CDMA Path of Cellular Protocols</p>","children":[],"payload":{"lines":"2211,2213"}},{"content":"\n<p data-lines=\"2213,2214\">Cellular Protocols</p>","children":[],"payload":{"lines":"2213,2215"}},{"content":"\n<p data-lines=\"2215,2216\">SWAT Hardware Kit</p>","children":[],"payload":{"lines":"2215,2217"}}],"payload":{"lines":"2191,2217"}},{"content":"\n<p data-lines=\"2217,2218\">Logical Vulnerabilities</p>","children":[{"content":"\n<p data-lines=\"2219,2220\">Basic Commands</p>","children":[],"payload":{"lines":"2219,2221"}},{"content":"\n<p data-lines=\"2221,2222\">Fake Captive Portals</p>","children":[],"payload":{"lines":"2221,2223"}},{"content":"\n<p data-lines=\"2223,2224\">MAC Spoofing</p>","children":[],"payload":{"lines":"2223,2225"}},{"content":"\n<p data-lines=\"2225,2226\">DNS Tunnelling</p>","children":[],"payload":{"lines":"2225,2227"}},{"content":"\n<p data-lines=\"2227,2228\">Man in the Middle</p>","children":[],"payload":{"lines":"2227,2229"}},{"content":"\n<p data-lines=\"2229,2230\">WEP Cracking</p>","children":[],"payload":{"lines":"2229,2231"}},{"content":"\n<p data-lines=\"2231,2232\">WPA2-PSK Cracking</p>","children":[],"payload":{"lines":"2231,2233"}},{"content":"\n<p data-lines=\"2233,2234\">PMKID Attack</p>","children":[],"payload":{"lines":"2233,2235"}},{"content":"\n<p data-lines=\"2235,2236\">Fake Access Points</p>","children":[],"payload":{"lines":"2235,2237"}},{"content":"\n<p data-lines=\"2237,2238\">Evil Twin</p>","children":[],"payload":{"lines":"2237,2239"}},{"content":"\n<p data-lines=\"2239,2240\">Brute Force</p>","children":[],"payload":{"lines":"2239,2241"}},{"content":"\n<p data-lines=\"2241,2242\">EAP Methods</p>","children":[],"payload":{"lines":"2241,2243"}},{"content":"\n<p data-lines=\"2243,2244\">Krack Attack</p>","children":[],"payload":{"lines":"2243,2245"}},{"content":"\n<p data-lines=\"2245,2246\">Wifi Jamming</p>","children":[],"payload":{"lines":"2245,2247"}},{"content":"\n<p data-lines=\"2247,2248\">Sniffing Wi-Fi</p>","children":[],"payload":{"lines":"2247,2249"}},{"content":"\n<p data-lines=\"2249,2250\">Rogue Access Point</p>","children":[],"payload":{"lines":"2249,2251"}}],"payload":{"lines":"2217,2251"}},{"content":"\n<p data-lines=\"2251,2252\">Bluetooth</p>","children":[{"content":"\n<p data-lines=\"2253,2254\">packet capture techniques</p>","children":[],"payload":{"lines":"2253,2255"}},{"content":"\n<p data-lines=\"2255,2256\">Bluetooth pairing techniques</p>","children":[],"payload":{"lines":"2255,2257"}},{"content":"\n<p data-lines=\"2257,2258\">Bluetooth pairing for PIN and key recovery</p>","children":[],"payload":{"lines":"2257,2259"}},{"content":"\n<p data-lines=\"2259,2260\">Recognizing BLE Frequency-Hopping</p>","children":[],"payload":{"lines":"2259,2261"}},{"content":"\n<p data-lines=\"2261,2262\">BLE Device Services with bluetoothctl</p>","children":[],"payload":{"lines":"2261,2263"}}],"payload":{"lines":"2251,2263"}},{"content":"\n<p data-lines=\"2263,2264\">Zigbee</p>","children":[{"content":"\n<p data-lines=\"2265,2266\">IEEE 802.15.4 Physical and MAC Layer Architecture</p>","children":[],"payload":{"lines":"2265,2267"}},{"content":"\n<p data-lines=\"2267,2268\">IEEE 802.15.4 Authentication and Cryptographic Controls</p>","children":[],"payload":{"lines":"2267,2269"}},{"content":"\n<p data-lines=\"2269,2270\">Weaknesses in Zigbee Key Provisioning</p>","children":[],"payload":{"lines":"2269,2271"}},{"content":"\n<p data-lines=\"2271,2272\">Over-the-Air Key Provisioning</p>","children":[],"payload":{"lines":"2271,2273"}},{"content":"\n<p data-lines=\"2273,2274\">Locating Zigbee Devices with Signal Analysis</p>","children":[],"payload":{"lines":"2273,2275"}}],"payload":{"lines":"2263,2275"}},{"content":"\n<p data-lines=\"2275,2276\">RFID and NFC</p>","children":[{"content":"\n<p data-lines=\"2277,2278\">Components, Transmission Frequencies</p>","children":[],"payload":{"lines":"2277,2279"}},{"content":"\n<p data-lines=\"2279,2280\">Active and Passive RFID Systems</p>","children":[],"payload":{"lines":"2279,2281"}},{"content":"\n<p data-lines=\"2281,2282\">NFC Systems Components and Protocols</p>","children":[],"payload":{"lines":"2281,2283"}},{"content":"\n<p data-lines=\"2283,2284\">Location Disclosure Attacks</p>","children":[],"payload":{"lines":"2283,2285"}},{"content":"\n<p data-lines=\"2285,2286\">E-Z Pass Location Disclosure</p>","children":[],"payload":{"lines":"2285,2287"}},{"content":"\n<p data-lines=\"2287,2288\">RFID Tracking Through UHF</p>","children":[],"payload":{"lines":"2287,2289"}},{"content":"\n<p data-lines=\"2289,2290\">RFIDiot for Low-Frequency</p>","children":[],"payload":{"lines":"2289,2291"}},{"content":"\n<p data-lines=\"2291,2292\">HID ProxCard Proximity Lock Systems</p>","children":[],"payload":{"lines":"2291,2293"}},{"content":"\n<p data-lines=\"2293,2294\">ProxMark RDV2 for Low-Frequency</p>","children":[],"payload":{"lines":"2293,2295"}},{"content":"\n<p data-lines=\"2295,2296\">Brute-Forcing HID Identifiers</p>","children":[],"payload":{"lines":"2295,2297"}},{"content":"\n<p data-lines=\"2297,2298\">HID Cloning Attacks</p>","children":[],"payload":{"lines":"2297,2299"}},{"content":"\n<p data-lines=\"2299,2300\">Low-Frequency Tag Analysis</p>","children":[],"payload":{"lines":"2299,2301"}},{"content":"\n<p data-lines=\"2301,2302\">Europay-Mastercard-Visa (EMV) PoS systems</p>","children":[],"payload":{"lines":"2301,2303"}},{"content":"\n<p data-lines=\"2303,2304\">MIFARE Classic Smart Card Systems</p>","children":[],"payload":{"lines":"2303,2305"}},{"content":"\n<p data-lines=\"2305,2306\">Smart Card Cloning with UID Impersonation</p>","children":[],"payload":{"lines":"2305,2307"}},{"content":"\n<p data-lines=\"2307,2308\">MIFARE Ultralight, Ultralight-C, and DESFire</p>","children":[],"payload":{"lines":"2307,2309"}},{"content":"\n<p data-lines=\"2309,2310\">Emulation Smart Cards with ProxMark RDV2</p>","children":[],"payload":{"lines":"2309,2311"}},{"content":"\n<p data-lines=\"2311,2312\">Decoding the NFC Data Exchange Format</p>","children":[],"payload":{"lines":"2311,2313"}},{"content":"\n<p data-lines=\"2313,2314\">Reading and Writing NFC/NDEF Tags</p>","children":[],"payload":{"lines":"2313,2315"}},{"content":"\n<p data-lines=\"2315,2316\">Android Devices with Malicious NFC Tags</p>","children":[],"payload":{"lines":"2315,2317"}}],"payload":{"lines":"2275,2317"}},{"content":"\n<p data-lines=\"2317,2318\">Environment Setup</p>","children":[{"content":"\n<p data-lines=\"2319,2320\">Installing and setting up OpenBSC</p>","children":[],"payload":{"lines":"2319,2321"}},{"content":"\n<p data-lines=\"2321,2322\">Programming your own SIM card</p>","children":[],"payload":{"lines":"2321,2323"}},{"content":"\n<p data-lines=\"2323,2324\">Installing and setting up srsLTE</p>","children":[],"payload":{"lines":"2323,2325"}},{"content":"\n<p data-lines=\"2325,2326\">Testing communications and modifying OpenBSC and srsLTE</p>","children":[],"payload":{"lines":"2325,2327"}},{"content":"\n<p data-lines=\"2327,2328\">Extracting the firmware image of the target and loading into Ghidra / IDA</p>","children":[],"payload":{"lines":"2327,2329"}},{"content":"\n<p data-lines=\"2329,2330\">Reverse engineering the target to identify cellular stack code</p>","children":[],"payload":{"lines":"2329,2331"}}],"payload":{"lines":"2317,2331"}},{"content":"\n<p data-lines=\"2331,2332\">IMS Security</p>","children":[{"content":"\n<p data-lines=\"2333,2334\">IMS Introduction</p>","children":[],"payload":{"lines":"2333,2335"}},{"content":"\n<p data-lines=\"2335,2336\">IMS Technologies</p>","children":[],"payload":{"lines":"2335,2337"}},{"content":"\n<p data-lines=\"2337,2338\">IMS Security Architecture</p>","children":[],"payload":{"lines":"2337,2339"}},{"content":"\n<p data-lines=\"2339,2340\">IMS-specific Protocols</p>","children":[],"payload":{"lines":"2339,2341"}},{"content":"\n<p data-lines=\"2341,2342\">Other Protocols in IMS</p>","children":[],"payload":{"lines":"2341,2343"}},{"content":"\n<p data-lines=\"2343,2344\">IMS Network Elements</p>","children":[],"payload":{"lines":"2343,2345"}},{"content":"\n<p data-lines=\"2345,2346\">Open Source IMS Tools</p>","children":[],"payload":{"lines":"2345,2347"}},{"content":"\n<p data-lines=\"2347,2348\">IMS Network Element Fingerprinting</p>","children":[],"payload":{"lines":"2347,2349"}},{"content":"\n<p data-lines=\"2349,2350\">IMS Infrastructure</p>","children":[],"payload":{"lines":"2349,2351"}},{"content":"\n<p data-lines=\"2351,2352\">Role of Legacy in IMS Security</p>","children":[],"payload":{"lines":"2351,2353"}},{"content":"\n<p data-lines=\"2353,2354\">Vulnerabilities Voice Over IP Protocols</p>","children":[],"payload":{"lines":"2353,2355"}},{"content":"\n<p data-lines=\"2355,2356\">Network Element and Vulnerabilities</p>","children":[],"payload":{"lines":"2355,2357"}},{"content":"\n<p data-lines=\"2357,2358\">Diameter Security</p>","children":[],"payload":{"lines":"2357,2359"}}],"payload":{"lines":"2331,2359"}},{"content":"\n<p data-lines=\"2359,2360\">4G</p>","children":[{"content":"\n<p data-lines=\"2361,2362\">LTE Introduction</p>","children":[],"payload":{"lines":"2361,2363"}},{"content":"\n<p data-lines=\"2363,2364\">LTE Security Architecture</p>","children":[],"payload":{"lines":"2363,2365"}},{"content":"\n<p data-lines=\"2365,2366\">LTE Network Elements Overview and Security Roles & functions</p>","children":[],"payload":{"lines":"2365,2367"}},{"content":"\n<p data-lines=\"2367,2368\">LTE Communication Security, Cryptography and Key Management</p>","children":[],"payload":{"lines":"2367,2369"}},{"content":"\n<p data-lines=\"2369,2370\">LTE Protocols</p>","children":[],"payload":{"lines":"2369,2371"}},{"content":"\n<p data-lines=\"2371,2372\">Typical Attacks on LTE Infrastructure</p>","children":[],"payload":{"lines":"2371,2373"}},{"content":"\n<p data-lines=\"2373,2374\">Recap of SS7 Attack Scenarios and Comparison to 4G</p>","children":[],"payload":{"lines":"2373,2375"}},{"content":"\n<p data-lines=\"2375,2376\">Role of Legacy in LTE Security</p>","children":[],"payload":{"lines":"2375,2377"}},{"content":"\n<p data-lines=\"2377,2378\">Network Elements and Their Functions: HSS, DRA/DEA, MME, PCRF, eNodeB, PGW, SGW</p>","children":[],"payload":{"lines":"2377,2379"}},{"content":"\n<p data-lines=\"2379,2380\">DRA Remote and RCE Compromise via Diameter</p>","children":[],"payload":{"lines":"2379,2381"}},{"content":"\n<p data-lines=\"2381,2382\">Vulnerabilities in VoLTE</p>","children":[],"payload":{"lines":"2381,2383"}},{"content":"\n<p data-lines=\"2383,2384\">Analysis of Generic LTE Network Element and Vulnerabilities</p>","children":[],"payload":{"lines":"2383,2385"}},{"content":"\n<p data-lines=\"2385,2386\">Diameter Security and Comparison to SIGTRAN and Radius Protocols</p>","children":[],"payload":{"lines":"2385,2387"}},{"content":"\n<p data-lines=\"2387,2388\">Diameter Fuzzing and Scanning</p>","children":[],"payload":{"lines":"2387,2389"}},{"content":"\n<p data-lines=\"2389,2390\">Diameter in a Roaming Context</p>","children":[],"payload":{"lines":"2389,2391"}},{"content":"\n<p data-lines=\"2391,2392\">NAS Security, Protocol Review and Known Attacks</p>","children":[],"payload":{"lines":"2391,2393"}},{"content":"\n<p data-lines=\"2393,2394\">SCTP Protocol Basics, Scanning and Attack Scenarios</p>","children":[],"payload":{"lines":"2393,2395"}},{"content":"\n<p data-lines=\"2395,2396\">SGW – PGW Infrastructure and Design and GTPv2 Scanning and Fuzzing</p>","children":[],"payload":{"lines":"2395,2397"}},{"content":"\n<p data-lines=\"2397,2398\">S1AP Interface Protocol Study and Known Vulnerabilities</p>","children":[],"payload":{"lines":"2397,2399"}},{"content":"\n<p data-lines=\"2399,2400\">Attack Scenarios Over the S1AP Interface</p>","children":[],"payload":{"lines":"2399,2401"}},{"content":"\n<p data-lines=\"2401,2402\">Attacking O&M (OAM & Management) of Network Elements</p>","children":[],"payload":{"lines":"2401,2403"}},{"content":"\n<p data-lines=\"2403,2404\">GRX / IPX Compromise Case Studies, Architecture and Design and Known Vulnerabilities</p>","children":[],"payload":{"lines":"2403,2405"}},{"content":"\n<p data-lines=\"2405,2406\">Scenarios of Attack of LTE Network</p>","children":[],"payload":{"lines":"2405,2407"}}],"payload":{"lines":"2359,2407"}},{"content":"\n<p data-lines=\"2407,2408\">5G</p>","children":[{"content":"\n<p data-lines=\"2409,2410\">5G different Architectures</p>","children":[],"payload":{"lines":"2409,2411"}},{"content":"\n<p data-lines=\"2411,2412\">Components of 5G Deployments</p>","children":[],"payload":{"lines":"2411,2413"}},{"content":"\n<p data-lines=\"2413,2414\">Free5GC and Open5GS</p>","children":[],"payload":{"lines":"2413,2415"}},{"content":"\n<p data-lines=\"2415,2416\">OpenAPI Specification</p>","children":[],"payload":{"lines":"2415,2417"}},{"content":"\n<p data-lines=\"2417,2418\">5G Core Network Exposure</p>","children":[],"payload":{"lines":"2417,2419"}},{"content":"\n<p data-lines=\"2419,2420\">5G Domain Security</p>","children":[],"payload":{"lines":"2419,2421"}},{"content":"\n<p data-lines=\"2421,2422\">5G RAN and Virtualized RAN</p>","children":[],"payload":{"lines":"2421,2423"}},{"content":"\n<p data-lines=\"2423,2424\">Non-Standalone (NSA) Security</p>","children":[],"payload":{"lines":"2423,2425"}},{"content":"\n<p data-lines=\"2425,2426\">5G UE, Handsets and SoCs</p>","children":[],"payload":{"lines":"2425,2427"}},{"content":"\n<p data-lines=\"2427,2428\">5G NR Radio Access</p>","children":[{"content":"\n<p data-lines=\"2429,2430\">Anonymization of Subscriber’s Fixed Identity</p>","children":[],"payload":{"lines":"2429,2431"}},{"content":"\n<p data-lines=\"2431,2432\">Authentication and Key Agreement (AKA)</p>","children":[],"payload":{"lines":"2431,2433"}},{"content":"\n<p data-lines=\"2433,2434\">Encryption and Integrity Protection of Control-Plane and User-Plane Traffic</p>","children":[],"payload":{"lines":"2433,2435"}},{"content":"\n<p data-lines=\"2435,2436\">Activation of the Security and Related Signalling Procedures</p>","children":[],"payload":{"lines":"2435,2437"}}],"payload":{"lines":"2427,2437"}},{"content":"\n<p data-lines=\"2437,2438\">5G Protocols in Term of Security</p>","children":[{"content":"\n<p data-lines=\"2439,2440\">X2 Extensions for NSA Deployment</p>","children":[],"payload":{"lines":"2439,2441"}},{"content":"\n<p data-lines=\"2441,2442\">F1AP</p>","children":[],"payload":{"lines":"2441,2443"}},{"content":"\n<p data-lines=\"2443,2444\">E1AP</p>","children":[],"payload":{"lines":"2443,2445"}},{"content":"\n<p data-lines=\"2445,2446\">PFCP</p>","children":[],"payload":{"lines":"2445,2447"}}],"payload":{"lines":"2437,2447"}},{"content":"\n<p data-lines=\"2447,2448\">5G Core, Service Based Architecture</p>","children":[],"payload":{"lines":"2447,2449"}},{"content":"\n<p data-lines=\"2449,2450\">Infrastructure level deployment, security</p>","children":[],"payload":{"lines":"2449,2451"}},{"content":"\n<p data-lines=\"2451,2452\">5G Multi-Tenant Environment (Slicing, NFV, SDN)</p>","children":[],"payload":{"lines":"2451,2453"}}],"payload":{"lines":"2407,2453"}},{"content":"\n<p data-lines=\"2453,2454\">SS7 Security</p>","children":[{"content":"\n<p data-lines=\"2455,2456\">SS7 Basics and Possibilities</p>","children":[],"payload":{"lines":"2455,2457"}},{"content":"\n<p data-lines=\"2457,2458\">SS7 Protocols Description</p>","children":[],"payload":{"lines":"2457,2459"}},{"content":"\n<p data-lines=\"2459,2460\">Telecom Signalling Networks Architectures</p>","children":[],"payload":{"lines":"2459,2461"}},{"content":"\n<p data-lines=\"2461,2462\">SS7 external access SS7Map review</p>","children":[],"payload":{"lines":"2461,2463"}},{"content":"\n<p data-lines=\"2463,2464\">SS7 low level protocols analysis</p>","children":[],"payload":{"lines":"2463,2465"}},{"content":"\n<p data-lines=\"2465,2466\">Low level SS7 packets analysis</p>","children":[],"payload":{"lines":"2465,2467"}},{"content":"\n<p data-lines=\"2467,2468\">Sniffing and Network Tracing</p>","children":[],"payload":{"lines":"2467,2469"}},{"content":"\n<p data-lines=\"2469,2470\">Signalling Attacks</p>","children":[],"payload":{"lines":"2469,2471"}},{"content":"\n<p data-lines=\"2471,2472\">SS7 and SIGTRAN Audit Methodology</p>","children":[],"payload":{"lines":"2471,2473"}},{"content":"\n<p data-lines=\"2473,2474\">Low Level Peering (M3UA and SCCP)</p>","children":[],"payload":{"lines":"2473,2475"}},{"content":"\n<p data-lines=\"2475,2476\">SCTP Scan Usage and Attack Scenarios in Core Network Settings</p>","children":[],"payload":{"lines":"2475,2477"}},{"content":"\n<p data-lines=\"2477,2478\">Scanning SS7 Networks - from MTP to SCTP and Upper SS7</p>","children":[],"payload":{"lines":"2477,2479"}},{"content":"\n<p data-lines=\"2479,2480\">SS7 Upper Level Protocols (User Adaptation Layers)</p>","children":[],"payload":{"lines":"2479,2481"}},{"content":"\n<p data-lines=\"2481,2482\">Network Elements and Their Functions, HLR, VLR, STP, SCP, BTS, GGSN, SGSN, MSC, 3G</p>","children":[],"payload":{"lines":"2481,2483"}}],"payload":{"lines":"2453,2483"}},{"content":"\n<p data-lines=\"2483,2484\">Signalling Vulnerabilities</p>","children":[{"content":"\n<p data-lines=\"2485,2486\">Network Elements Underlying Technologies</p>","children":[],"payload":{"lines":"2485,2487"}},{"content":"\n<p data-lines=\"2487,2488\">Identifying Signalling and Core Network Equipment: Proprietary OS, Windows-Based, Linux-Based</p>","children":[],"payload":{"lines":"2487,2489"}},{"content":"\n<p data-lines=\"2489,2490\">GPRS Signalling Technologies (GTP-C, GTP-U and GTP Prime) and Known Vulnerabilities</p>","children":[],"payload":{"lines":"2489,2491"}},{"content":"\n<p data-lines=\"2491,2492\">Attacking GPRS and GTP-Scanning</p>","children":[],"payload":{"lines":"2491,2493"}},{"content":"\n<p data-lines=\"2493,2494\">Attack Scenarios and Case Studies from GRX and SCCP Providers</p>","children":[],"payload":{"lines":"2493,2495"}},{"content":"\n<p data-lines=\"2495,2496\">Attacking O&M (OAM & Management) Infrastructures</p>","children":[],"payload":{"lines":"2495,2497"}},{"content":"\n<p data-lines=\"2497,2498\">SS7 Signalling Equipment Vulnerabilities</p>","children":[],"payload":{"lines":"2497,2499"}},{"content":"\n<p data-lines=\"2499,2500\">Crafting SS7 Packets (MSU) by Hand</p>","children":[],"payload":{"lines":"2499,2501"}},{"content":"\n<p data-lines=\"2501,2502\">Context and Network Layers</p>","children":[],"payload":{"lines":"2501,2503"}},{"content":"\n<p data-lines=\"2503,2504\">Spoofing SS7</p>","children":[],"payload":{"lines":"2503,2505"}},{"content":"\n<p data-lines=\"2505,2506\">Discovering Zero Days in SS7 Equipment</p>","children":[],"payload":{"lines":"2505,2507"}},{"content":"\n<p data-lines=\"2507,2508\">Industrialization of Vulnerability Scanning in SS7 & SIGTRAN Context</p>","children":[],"payload":{"lines":"2507,2509"}},{"content":"\n<p data-lines=\"2509,2510\">RADIUS Protocol, Usage and Possible Attacks</p>","children":[],"payload":{"lines":"2509,2511"}}],"payload":{"lines":"2483,2511"}},{"content":"\n<p data-lines=\"2511,2512\">Higher Level Applications</p>","children":[{"content":"\n<p data-lines=\"2513,2514\">SMS Fraud and Abuses</p>","children":[],"payload":{"lines":"2513,2515"}},{"content":"\n<p data-lines=\"2515,2516\">Fraud Management Systems (FMS) and FRA</p>","children":[],"payload":{"lines":"2515,2517"}},{"content":"\n<p data-lines=\"2517,2518\">Lawful Interception (LI) Systems</p>","children":[],"payload":{"lines":"2517,2519"}},{"content":"\n<p data-lines=\"2519,2520\">Limits of CDR Based Fraud Detection and Security</p>","children":[],"payload":{"lines":"2519,2521"}},{"content":"\n<p data-lines=\"2521,2522\">Mobile Application Part (MAP) Message Analysis and Attack Traffic</p>","children":[],"payload":{"lines":"2521,2523"}},{"content":"\n<p data-lines=\"2523,2524\">GSMA MAP Screening Recommendations (Cat1, Cat2, Cat3, Cat3+ and Cat SMS)</p>","children":[],"payload":{"lines":"2523,2525"}},{"content":"\n<p data-lines=\"2525,2526\">Examination of SS7 Attack Scenarios from National and International Perimeters</p>","children":[],"payload":{"lines":"2525,2527"}}],"payload":{"lines":"2511,2527"}}],"payload":{"lines":"2189,2527"}}],"payload":{"lines":"2175,2527"}},{"content":"\n<p data-lines=\"2527,2528\">IoT</p>","children":[{"content":"\n<p data-lines=\"2529,2530\">Prerequisites</p>","children":[{"content":"\n<p data-lines=\"2531,2532\">Basics of Network</p>","children":[],"payload":{"lines":"2531,2533"}},{"content":"\n<p data-lines=\"2533,2534\">Basics of Linux</p>","children":[],"payload":{"lines":"2533,2535"}},{"content":"\n<p data-lines=\"2535,2536\">Basics of C/C++</p>","children":[],"payload":{"lines":"2535,2537"}},{"content":"\n<p data-lines=\"2537,2538\">Professional Python</p>","children":[],"payload":{"lines":"2537,2539"}}],"payload":{"lines":"2529,2539"}},{"content":"\n<p data-lines=\"2539,2540\">Syllabus</p>","children":[{"content":"\n<p data-lines=\"2541,2542\">Firmware Extraction</p>","children":[{"content":"\n<p data-lines=\"2543,2544\">Embedded Device Landscape</p>","children":[],"payload":{"lines":"2543,2545"}},{"content":"\n<p data-lines=\"2545,2546\">Hardware/Software Tools and Storage Media</p>","children":[],"payload":{"lines":"2545,2547"}},{"content":"\n<p data-lines=\"2547,2548\">Making Use of Debug Interfaces (UART, JTAG)</p>","children":[],"payload":{"lines":"2547,2549"}},{"content":"\n<p data-lines=\"2549,2550\">Analysing Analog and Digital Signals</p>","children":[],"payload":{"lines":"2549,2551"}},{"content":"\n<p data-lines=\"2551,2552\">Firmware Extraction Techniques</p>","children":[],"payload":{"lines":"2551,2553"}}],"payload":{"lines":"2541,2553"}},{"content":"\n<p data-lines=\"2553,2554\">Firmware Analysis</p>","children":[{"content":"\n<p data-lines=\"2555,2556\">Understanding Firmware</p>","children":[],"payload":{"lines":"2555,2557"}},{"content":"\n<p data-lines=\"2557,2558\">Loading and Analysing</p>","children":[],"payload":{"lines":"2557,2559"}},{"content":"\n<p data-lines=\"2559,2560\">Embedded Device File Systems</p>","children":[],"payload":{"lines":"2559,2561"}},{"content":"\n<p data-lines=\"2561,2562\">Emulating and Debugging Firmware</p>","children":[],"payload":{"lines":"2561,2563"}},{"content":"\n<p data-lines=\"2563,2564\">Rooting Devices for Debug Access</p>","children":[],"payload":{"lines":"2563,2565"}}],"payload":{"lines":"2553,2565"}}],"payload":{"lines":"2539,2565"}}],"payload":{"lines":"2527,2565"}}],"payload":{"lines":"5,6"}},{"content":"Red Team","children":[{"content":"\n<p data-lines=\"2567,2568\">Enterprise</p>","children":[{"content":"\n<p data-lines=\"2569,2570\">Prerequisites</p>","children":[{"content":"\n<p data-lines=\"2571,2572\">Basics of Network</p>","children":[],"payload":{"lines":"2571,2573"}},{"content":"\n<p data-lines=\"2573,2574\">Basics of Linux</p>","children":[],"payload":{"lines":"2573,2575"}},{"content":"\n<p data-lines=\"2575,2576\">Basics of HTML and CSS</p>","children":[],"payload":{"lines":"2575,2577"}},{"content":"\n<p data-lines=\"2577,2578\">Basics of JavaScript and NodeJS</p>","children":[],"payload":{"lines":"2577,2579"}},{"content":"\n<p data-lines=\"2579,2580\">Basics of JSON and XML</p>","children":[],"payload":{"lines":"2579,2581"}},{"content":"\n<p data-lines=\"2581,2582\">Basics of SQL and NoSQL</p>","children":[],"payload":{"lines":"2581,2583"}},{"content":"\n<p data-lines=\"2583,2584\">Basics of PHP</p>","children":[],"payload":{"lines":"2583,2585"}},{"content":"\n<p data-lines=\"2585,2586\">Basics of Java</p>","children":[],"payload":{"lines":"2585,2587"}},{"content":"\n<p data-lines=\"2587,2588\">Basics of C-Sharp</p>","children":[],"payload":{"lines":"2587,2589"}},{"content":"\n<p data-lines=\"2589,2590\">Basics of ASP.NET</p>","children":[],"payload":{"lines":"2589,2591"}},{"content":"\n<p data-lines=\"2591,2592\">Professional Python</p>","children":[],"payload":{"lines":"2591,2593"}},{"content":"\n<p data-lines=\"2593,2594\">Professional Golang</p>","children":[],"payload":{"lines":"2593,2595"}},{"content":"\n<p data-lines=\"2595,2596\">Professional Powershell</p>","children":[],"payload":{"lines":"2595,2597"}},{"content":"\n<p data-lines=\"2597,2598\">Professional C/C++</p>","children":[],"payload":{"lines":"2597,2599"}}],"payload":{"lines":"2569,2599"}},{"content":"\n<p data-lines=\"2599,2600\">Syllabus</p>","children":[{"content":"\n<p data-lines=\"2601,2602\">Introduction</p>","children":[{"content":"\n<p data-lines=\"2603,2604\">Linux System</p>","children":[{"content":"\n<p data-lines=\"2605,2606\">Linux Kernel</p>","children":[],"payload":{"lines":"2605,2607"}},{"content":"\n<p data-lines=\"2607,2608\">Basic I/O Operations</p>","children":[],"payload":{"lines":"2607,2609"}},{"content":"\n<p data-lines=\"2609,2610\">Advanced I/O interfaces</p>","children":[],"payload":{"lines":"2609,2611"}},{"content":"\n<p data-lines=\"2611,2612\">System Calls for Process Management</p>","children":[],"payload":{"lines":"2611,2613"}},{"content":"\n<p data-lines=\"2613,2614\">Advanced Process Management</p>","children":[],"payload":{"lines":"2613,2615"}},{"content":"\n<p data-lines=\"2615,2616\">Multithreaded Programming</p>","children":[],"payload":{"lines":"2615,2617"}},{"content":"\n<p data-lines=\"2617,2618\">File and Directory Management</p>","children":[],"payload":{"lines":"2617,2619"}},{"content":"\n<p data-lines=\"2619,2620\">Interfaces for Allocating Memory</p>","children":[],"payload":{"lines":"2619,2621"}},{"content":"\n<p data-lines=\"2621,2622\">Basic and Advanced Signal Interfaces</p>","children":[],"payload":{"lines":"2621,2623"}},{"content":"\n<p data-lines=\"2623,2624\">Clock Management</p>","children":[],"payload":{"lines":"2623,2625"}}],"payload":{"lines":"2603,2625"}},{"content":"\n<p data-lines=\"2625,2626\">Windows Internals</p>","children":[{"content":"\n<p data-lines=\"2627,2628\">System Architecture</p>","children":[],"payload":{"lines":"2627,2629"}},{"content":"\n<p data-lines=\"2629,2630\">Process and Jobs</p>","children":[],"payload":{"lines":"2629,2631"}},{"content":"\n<p data-lines=\"2631,2632\">Threads</p>","children":[],"payload":{"lines":"2631,2633"}},{"content":"\n<p data-lines=\"2633,2634\">Kernel Mechanisms</p>","children":[],"payload":{"lines":"2633,2635"}},{"content":"\n<p data-lines=\"2635,2636\">Memory Management</p>","children":[],"payload":{"lines":"2635,2637"}},{"content":"\n<p data-lines=\"2637,2638\">I/O System</p>","children":[],"payload":{"lines":"2637,2639"}},{"content":"\n<p data-lines=\"2639,2640\">Security</p>","children":[],"payload":{"lines":"2639,2641"}}],"payload":{"lines":"2625,2641"}},{"content":"\n<p data-lines=\"2641,2642\">x86/x64 Assembly</p>","children":[{"content":"\n<p data-lines=\"2643,2644\">CPU Registers</p>","children":[],"payload":{"lines":"2643,2645"}},{"content":"\n<p data-lines=\"2645,2646\">SUB Registers</p>","children":[],"payload":{"lines":"2645,2647"}},{"content":"\n<p data-lines=\"2647,2648\">MOV Instruction</p>","children":[],"payload":{"lines":"2647,2649"}},{"content":"\n<p data-lines=\"2649,2650\">ADD and SUB Instructions</p>","children":[],"payload":{"lines":"2649,2651"}},{"content":"\n<p data-lines=\"2651,2652\">INC and DEC Instructions</p>","children":[],"payload":{"lines":"2651,2653"}},{"content":"\n<p data-lines=\"2653,2654\">MUL and DIV Instructions</p>","children":[],"payload":{"lines":"2653,2655"}},{"content":"\n<p data-lines=\"2655,2656\">PUSH and POP Instructions</p>","children":[],"payload":{"lines":"2655,2657"}},{"content":"\n<p data-lines=\"2657,2658\">CMP and JMP Instructions</p>","children":[],"payload":{"lines":"2657,2659"}},{"content":"\n<p data-lines=\"2659,2660\">CALL and RET Instructions</p>","children":[],"payload":{"lines":"2659,2661"}},{"content":"\n<p data-lines=\"2661,2662\">Avoiding Null Bytes</p>","children":[],"payload":{"lines":"2661,2663"}},{"content":"\n<p data-lines=\"2663,2664\">Function Calls</p>","children":[],"payload":{"lines":"2663,2665"}},{"content":"\n<p data-lines=\"2665,2666\">Input and Output Functions</p>","children":[],"payload":{"lines":"2665,2667"}},{"content":"\n<p data-lines=\"2667,2668\">Code Caves</p>","children":[],"payload":{"lines":"2667,2669"}},{"content":"\n<p data-lines=\"2669,2670\">Structured Programming</p>","children":[],"payload":{"lines":"2669,2671"}},{"content":"\n<p data-lines=\"2671,2672\">Bitwise Operations</p>","children":[],"payload":{"lines":"2671,2673"}},{"content":"\n<p data-lines=\"2673,2674\">Signed Operations</p>","children":[],"payload":{"lines":"2673,2675"}},{"content":"\n<p data-lines=\"2675,2676\">Memory Arrays</p>","children":[],"payload":{"lines":"2675,2677"}}],"payload":{"lines":"2641,2677"}}],"payload":{"lines":"2601,2677"}},{"content":"\n<p data-lines=\"2677,2678\">Reconnaissance</p>","children":[{"content":"\n<p data-lines=\"2679,2680\">Active Scanning</p>","children":[],"payload":{"lines":"2679,2681"}},{"content":"\n<p data-lines=\"2681,2682\">Gather Victim Host Information</p>","children":[],"payload":{"lines":"2681,2683"}},{"content":"\n<p data-lines=\"2683,2684\">Gather Victim Network Information</p>","children":[],"payload":{"lines":"2683,2685"}},{"content":"\n<p data-lines=\"2685,2686\">Gather Victim Org Information</p>","children":[],"payload":{"lines":"2685,2687"}},{"content":"\n<p data-lines=\"2687,2688\">Phishing for Information</p>","children":[],"payload":{"lines":"2687,2689"}},{"content":"\n<p data-lines=\"2689,2690\">Search Closed Sources</p>","children":[],"payload":{"lines":"2689,2691"}},{"content":"\n<p data-lines=\"2691,2692\">Search Open Technical Databases</p>","children":[],"payload":{"lines":"2691,2693"}},{"content":"\n<p data-lines=\"2693,2694\">Search Open Websites/Domains</p>","children":[],"payload":{"lines":"2693,2695"}},{"content":"\n<p data-lines=\"2695,2696\">Search Victim-Owned Websites</p>","children":[],"payload":{"lines":"2695,2697"}}],"payload":{"lines":"2677,2697"}},{"content":"\n<p data-lines=\"2697,2698\">Resource Development</p>","children":[{"content":"\n<p data-lines=\"2699,2700\">Acquire Infrastructure</p>","children":[],"payload":{"lines":"2699,2701"}},{"content":"\n<p data-lines=\"2701,2702\">Compromise Accounts</p>","children":[],"payload":{"lines":"2701,2703"}},{"content":"\n<p data-lines=\"2703,2704\">Compromise Infrastructure</p>","children":[],"payload":{"lines":"2703,2705"}},{"content":"\n<p data-lines=\"2705,2706\">Develop Capabilities</p>","children":[],"payload":{"lines":"2705,2707"}},{"content":"\n<p data-lines=\"2707,2708\">Establish Accounts</p>","children":[],"payload":{"lines":"2707,2709"}},{"content":"\n<p data-lines=\"2709,2710\">Obtain Capabilities</p>","children":[],"payload":{"lines":"2709,2711"}},{"content":"\n<p data-lines=\"2711,2712\">Stage Capabilities</p>","children":[],"payload":{"lines":"2711,2713"}}],"payload":{"lines":"2697,2713"}},{"content":"\n<p data-lines=\"2713,2714\">Initial Access</p>","children":[{"content":"\n<p data-lines=\"2715,2716\">Drive-by Compromise</p>","children":[],"payload":{"lines":"2715,2717"}},{"content":"\n<p data-lines=\"2717,2718\">Exploit Public-Facing Application</p>","children":[],"payload":{"lines":"2717,2719"}},{"content":"\n<p data-lines=\"2719,2720\">External Remote Services</p>","children":[],"payload":{"lines":"2719,2721"}},{"content":"\n<p data-lines=\"2721,2722\">Hardware Additions</p>","children":[],"payload":{"lines":"2721,2723"}},{"content":"\n<p data-lines=\"2723,2724\">Phishing</p>","children":[],"payload":{"lines":"2723,2725"}},{"content":"\n<p data-lines=\"2725,2726\">Replication Through Removable Media</p>","children":[],"payload":{"lines":"2725,2727"}},{"content":"\n<p data-lines=\"2727,2728\">Supply Chain Compromise</p>","children":[],"payload":{"lines":"2727,2729"}},{"content":"\n<p data-lines=\"2729,2730\">Trusted Relationship</p>","children":[],"payload":{"lines":"2729,2731"}},{"content":"\n<p data-lines=\"2731,2732\">Valid Accounts</p>","children":[],"payload":{"lines":"2731,2733"}}],"payload":{"lines":"2713,2733"}},{"content":"\n<p data-lines=\"2733,2734\">Execution</p>","children":[{"content":"\n<p data-lines=\"2735,2736\">Command and Scripting Interpreter</p>","children":[],"payload":{"lines":"2735,2737"}},{"content":"\n<p data-lines=\"2737,2738\">Container Administration Command</p>","children":[],"payload":{"lines":"2737,2739"}},{"content":"\n<p data-lines=\"2739,2740\">Deploy Container</p>","children":[],"payload":{"lines":"2739,2741"}},{"content":"\n<p data-lines=\"2741,2742\">Exploitation for Client Execution</p>","children":[{"content":"\n<p data-lines=\"2743,2744\">Browser-based Exploitation</p>","children":[{"content":"\n<p data-lines=\"2745,2746\">Prerequisites</p>","children":[{"content":"\n<p data-lines=\"2747,2748\">Intel Assembly</p>","children":[],"payload":{"lines":"2747,2749"}},{"content":"\n<p data-lines=\"2749,2750\">AMD64 Assembly</p>","children":[],"payload":{"lines":"2749,2751"}}],"payload":{"lines":"2745,2751"}},{"content":"\n<p data-lines=\"2751,2752\">Syllabus</p>","children":[{"content":"\n<p data-lines=\"2753,2754\">Practical Fuzzing</p>","children":[{"content":"\n<p data-lines=\"2755,2756\">Browser Internals and Fuzzing Basics</p>","children":[{"content":"\n<p data-lines=\"2757,2758\">Introduction to Fuzzing</p>","children":[],"payload":{"lines":"2757,2759"}},{"content":"\n<p data-lines=\"2759,2760\">Modern Browser Architecture & Major Components</p>","children":[],"payload":{"lines":"2759,2761"}},{"content":"\n<p data-lines=\"2761,2762\">Setting up a Testing and Debugging Environment</p>","children":[],"payload":{"lines":"2761,2763"}},{"content":"\n<p data-lines=\"2763,2764\">Compile and Explore Famous Browser Codebases</p>","children":[],"payload":{"lines":"2763,2765"}},{"content":"\n<p data-lines=\"2765,2766\">Fuzzing Web Browsers Fundamentals</p>","children":[],"payload":{"lines":"2765,2767"}},{"content":"\n<p data-lines=\"2767,2768\">Improving Your Fuzzing Workflow & Automation</p>","children":[],"payload":{"lines":"2767,2769"}}],"payload":{"lines":"2755,2769"}},{"content":"\n<p data-lines=\"2769,2770\">Fuzzing DOM & Rendering Engines</p>","children":[{"content":"\n<p data-lines=\"2771,2772\">Introduction to the Rendering Engine</p>","children":[],"payload":{"lines":"2771,2773"}},{"content":"\n<p data-lines=\"2773,2774\">HTML/CSS/XML Parsing</p>","children":[],"payload":{"lines":"2773,2775"}},{"content":"\n<p data-lines=\"2775,2776\">Analysis of Existing CVEs, Issues, and PoCs</p>","children":[],"payload":{"lines":"2775,2777"}},{"content":"\n<p data-lines=\"2777,2778\">Blink, Gecko & WebKit Fuzzing</p>","children":[],"payload":{"lines":"2777,2779"}},{"content":"\n<p data-lines=\"2779,2780\">DOM Rendering & Implementation</p>","children":[],"payload":{"lines":"2779,2781"}},{"content":"\n<p data-lines=\"2781,2782\">Fuzzing DOM using Grammar-Based Fuzzing</p>","children":[],"payload":{"lines":"2781,2783"}}],"payload":{"lines":"2769,2783"}},{"content":"\n<p data-lines=\"2783,2784\">Fuzzing JavaScript Engines & JIT Compilers</p>","children":[{"content":"\n<p data-lines=\"2785,2786\">JavaScript Engine Internals & APIs</p>","children":[],"payload":{"lines":"2785,2787"}},{"content":"\n<p data-lines=\"2787,2788\">Memory Management and Garbage Collection</p>","children":[],"payload":{"lines":"2787,2789"}},{"content":"\n<p data-lines=\"2789,2790\">Analysis of Existing CVEs, Issues, and PoCs</p>","children":[],"payload":{"lines":"2789,2791"}},{"content":"\n<p data-lines=\"2791,2792\">V8, Spidermonkey & JavaScriptCore Fuzzing</p>","children":[],"payload":{"lines":"2791,2793"}},{"content":"\n<p data-lines=\"2793,2794\">JIT Compilers Internals</p>","children":[],"payload":{"lines":"2793,2795"}},{"content":"\n<p data-lines=\"2795,2796\">TurboFan and IonMonkey Fuzzing</p>","children":[],"payload":{"lines":"2795,2797"}}],"payload":{"lines":"2783,2797"}},{"content":"\n<p data-lines=\"2797,2798\">Fuzzing WebAssembly Compilers & APIs</p>","children":[{"content":"\n<p data-lines=\"2799,2800\">Introduction to WebAssembly</p>","children":[],"payload":{"lines":"2799,2801"}},{"content":"\n<p data-lines=\"2801,2802\">VM Architecture & Implementation</p>","children":[],"payload":{"lines":"2801,2803"}},{"content":"\n<p data-lines=\"2803,2804\">Analysis of Existing CVEs, Issues, and PoCs</p>","children":[],"payload":{"lines":"2803,2805"}},{"content":"\n<p data-lines=\"2805,2806\">Fuzzing WebAssembly JavaScript APIs</p>","children":[],"payload":{"lines":"2805,2807"}},{"content":"\n<p data-lines=\"2807,2808\">WebAssembly Compilers Internals</p>","children":[],"payload":{"lines":"2807,2809"}},{"content":"\n<p data-lines=\"2809,2810\">WebAssembly In-Process Fuzzing</p>","children":[],"payload":{"lines":"2809,2811"}}],"payload":{"lines":"2797,2811"}},{"content":"\n<p data-lines=\"2811,2812\">Fuzzing IPC and other Components</p>","children":[{"content":"\n<p data-lines=\"2813,2814\">Inter-Process Communication (IPC) Internals</p>","children":[],"payload":{"lines":"2813,2815"}},{"content":"\n<p data-lines=\"2815,2816\">Analysis of Existing CVEs, Issues, and PoCs</p>","children":[],"payload":{"lines":"2815,2817"}},{"content":"\n<p data-lines=\"2817,2818\">Fuzzing Chrome Mojo/Legacy IPC</p>","children":[],"payload":{"lines":"2817,2819"}},{"content":"\n<p data-lines=\"2819,2820\">Discovery of Other Components' Implementation</p>","children":[],"payload":{"lines":"2819,2821"}},{"content":"\n<p data-lines=\"2821,2822\">Networking/Data Persistence APIs</p>","children":[],"payload":{"lines":"2821,2823"}},{"content":"\n<p data-lines=\"2823,2824\">Fuzzing Media and Other Plugins</p>","children":[],"payload":{"lines":"2823,2825"}}],"payload":{"lines":"2811,2825"}}],"payload":{"lines":"2753,2825"}},{"content":"\n<p data-lines=\"2825,2826\">Browser Architecture (General, Chrome, Safari/Webkit)</p>","children":[],"payload":{"lines":"2825,2827"}},{"content":"\n<p data-lines=\"2827,2828\">JavaScript Internals in Exploitation (General, V8, JSC)</p>","children":[],"payload":{"lines":"2827,2829"}},{"content":"\n<p data-lines=\"2829,2830\">JavaScript JIT Compilers (General, V8)</p>","children":[],"payload":{"lines":"2829,2831"}},{"content":"\n<p data-lines=\"2831,2832\">JavaScript Exploit Engineering (General, V8, JSC)</p>","children":[],"payload":{"lines":"2831,2833"}}],"payload":{"lines":"2751,2833"}}],"payload":{"lines":"2743,2833"}},{"content":"\n<p data-lines=\"2833,2834\">FileFormat-Based Exploitation</p>","children":[{"content":"\n<p data-lines=\"2835,2836\">Prerequisites</p>","children":[{"content":"\n<p data-lines=\"2837,2838\">Subtopic 1</p>","children":[],"payload":{"lines":"2837,2839"}},{"content":"\n<p data-lines=\"2839,2840\">Subtopic 2</p>","children":[],"payload":{"lines":"2839,2841"}},{"content":"\n<p data-lines=\"2841,2842\">Subtopic 3</p>","children":[],"payload":{"lines":"2841,2843"}},{"content":"\n<p data-lines=\"2843,2844\">Subtopic 4</p>","children":[],"payload":{"lines":"2843,2845"}},{"content":"\n<p data-lines=\"2845,2846\">Subtopic 5</p>","children":[],"payload":{"lines":"2845,2847"}},{"content":"\n<p data-lines=\"2847,2848\">Subtopic 6</p>","children":[],"payload":{"lines":"2847,2849"}},{"content":"\n<p data-lines=\"2849,2850\">Subtopic 7</p>","children":[],"payload":{"lines":"2849,2851"}}],"payload":{"lines":"2835,2851"}},{"content":"\n<p data-lines=\"2851,2852\">Syllabus</p>","children":[{"content":"\n<p data-lines=\"2853,2854\">Subtopic 1</p>","children":[],"payload":{"lines":"2853,2855"}},{"content":"\n<p data-lines=\"2855,2856\">Subtopic 2</p>","children":[],"payload":{"lines":"2855,2857"}},{"content":"\n<p data-lines=\"2857,2858\">Subtopic 3</p>","children":[],"payload":{"lines":"2857,2859"}},{"content":"\n<p data-lines=\"2859,2860\">Subtopic 4</p>","children":[],"payload":{"lines":"2859,2861"}},{"content":"\n<p data-lines=\"2861,2862\">Subtopic 5</p>","children":[],"payload":{"lines":"2861,2863"}},{"content":"\n<p data-lines=\"2863,2864\">Subtopic 6</p>","children":[],"payload":{"lines":"2863,2865"}},{"content":"\n<p data-lines=\"2865,2866\">Subtopic 7</p>","children":[],"payload":{"lines":"2865,2867"}},{"content":"\n<p data-lines=\"2867,2868\">Subtopic 8</p>","children":[],"payload":{"lines":"2867,2869"}},{"content":"\n<p data-lines=\"2869,2870\">Subtopic 9</p>","children":[],"payload":{"lines":"2869,2871"}}],"payload":{"lines":"2851,2871"}}],"payload":{"lines":"2833,2871"}}],"payload":{"lines":"2741,2871"}},{"content":"\n<p data-lines=\"2871,2872\">Inter-Process Communication</p>","children":[],"payload":{"lines":"2871,2873"}},{"content":"\n<p data-lines=\"2873,2874\">Native API</p>","children":[],"payload":{"lines":"2873,2875"}},{"content":"\n<p data-lines=\"2875,2876\">Scheduled Task/Job</p>","children":[],"payload":{"lines":"2875,2877"}},{"content":"\n<p data-lines=\"2877,2878\">Serverless Execution</p>","children":[],"payload":{"lines":"2877,2879"}},{"content":"\n<p data-lines=\"2879,2880\">Shared Modules</p>","children":[],"payload":{"lines":"2879,2881"}},{"content":"\n<p data-lines=\"2881,2882\">Software Deployment Tools</p>","children":[],"payload":{"lines":"2881,2883"}},{"content":"\n<p data-lines=\"2883,2884\">System Services</p>","children":[],"payload":{"lines":"2883,2885"}},{"content":"\n<p data-lines=\"2885,2886\">User Execution</p>","children":[],"payload":{"lines":"2885,2887"}},{"content":"\n<p data-lines=\"2887,2888\">Windows Management Instrumentation</p>","children":[],"payload":{"lines":"2887,2889"}}],"payload":{"lines":"2733,2889"}},{"content":"\n<p data-lines=\"2889,2890\">Persistence</p>","children":[{"content":"\n<p data-lines=\"2891,2892\">Account Manipulation</p>","children":[],"payload":{"lines":"2891,2893"}},{"content":"\n<p data-lines=\"2893,2894\">BITS Jobs</p>","children":[],"payload":{"lines":"2893,2895"}},{"content":"\n<p data-lines=\"2895,2896\">Boot or Logon Autostart Execution</p>","children":[],"payload":{"lines":"2895,2897"}},{"content":"\n<p data-lines=\"2897,2898\">Boot or Logon Initialization Scripts</p>","children":[],"payload":{"lines":"2897,2899"}},{"content":"\n<p data-lines=\"2899,2900\">Browser Extensions</p>","children":[],"payload":{"lines":"2899,2901"}},{"content":"\n<p data-lines=\"2901,2902\">Compromise Client Software Binary</p>","children":[],"payload":{"lines":"2901,2903"}},{"content":"\n<p data-lines=\"2903,2904\">Create Account</p>","children":[],"payload":{"lines":"2903,2905"}},{"content":"\n<p data-lines=\"2905,2906\">Create or Modify System Process</p>","children":[],"payload":{"lines":"2905,2907"}},{"content":"\n<p data-lines=\"2907,2908\">Event Triggered Execution</p>","children":[],"payload":{"lines":"2907,2909"}},{"content":"\n<p data-lines=\"2909,2910\">External Remote Services</p>","children":[],"payload":{"lines":"2909,2911"}},{"content":"\n<p data-lines=\"2911,2912\">Hijack Execution Flow</p>","children":[],"payload":{"lines":"2911,2913"}},{"content":"\n<p data-lines=\"2913,2914\">Implant Internal Image</p>","children":[],"payload":{"lines":"2913,2915"}},{"content":"\n<p data-lines=\"2915,2916\">Modify Authentication Process</p>","children":[],"payload":{"lines":"2915,2917"}},{"content":"\n<p data-lines=\"2917,2918\">Office Application Startup</p>","children":[],"payload":{"lines":"2917,2919"}},{"content":"\n<p data-lines=\"2919,2920\">Pre-OS Boot</p>","children":[],"payload":{"lines":"2919,2921"}},{"content":"\n<p data-lines=\"2921,2922\">Scheduled Task/Job</p>","children":[],"payload":{"lines":"2921,2923"}},{"content":"\n<p data-lines=\"2923,2924\">Server Software Component</p>","children":[],"payload":{"lines":"2923,2925"}},{"content":"\n<p data-lines=\"2925,2926\">Traffic Signaling</p>","children":[],"payload":{"lines":"2925,2927"}},{"content":"\n<p data-lines=\"2927,2928\">Valid Accounts</p>","children":[],"payload":{"lines":"2927,2929"}}],"payload":{"lines":"2889,2929"}},{"content":"\n<p data-lines=\"2929,2930\">Privilege Escalation</p>","children":[{"content":"\n<p data-lines=\"2931,2932\">Abuse Elevation Control Mechanism</p>","children":[],"payload":{"lines":"2931,2933"}},{"content":"\n<p data-lines=\"2933,2934\">Access Token Manipulation</p>","children":[],"payload":{"lines":"2933,2935"}},{"content":"\n<p data-lines=\"2935,2936\">Boot or Logon Autostart Execution</p>","children":[],"payload":{"lines":"2935,2937"}},{"content":"\n<p data-lines=\"2937,2938\">Boot or Logon Initialization Scripts</p>","children":[],"payload":{"lines":"2937,2939"}},{"content":"\n<p data-lines=\"2939,2940\">Create or Modify System Process</p>","children":[],"payload":{"lines":"2939,2941"}},{"content":"\n<p data-lines=\"2941,2942\">Domain Policy Modification</p>","children":[],"payload":{"lines":"2941,2943"}},{"content":"\n<p data-lines=\"2943,2944\">Escape to Host</p>","children":[],"payload":{"lines":"2943,2945"}},{"content":"\n<p data-lines=\"2945,2946\">Event Triggered Execution</p>","children":[],"payload":{"lines":"2945,2947"}},{"content":"\n<p data-lines=\"2947,2948\">Exploitation for Privilege Escalation</p>","children":[{"content":"\n<p data-lines=\"2949,2950\">Windows</p>","children":[{"content":"\n<p data-lines=\"2951,2952\">Windows Kernel Debugging</p>","children":[{"content":"\n<p data-lines=\"2953,2954\">Setup Kernel Debugging</p>","children":[],"payload":{"lines":"2953,2955"}},{"content":"\n<p data-lines=\"2955,2956\">Setup Debugging Symbols</p>","children":[],"payload":{"lines":"2955,2957"}},{"content":"\n<p data-lines=\"2957,2958\">WinDbg-Fu</p>","children":[],"payload":{"lines":"2957,2959"}}],"payload":{"lines":"2951,2959"}},{"content":"\n<p data-lines=\"2959,2960\">Windows Internals</p>","children":[{"content":"\n<p data-lines=\"2961,2962\">Windows NT Architecture</p>","children":[],"payload":{"lines":"2961,2963"}},{"content":"\n<p data-lines=\"2963,2964\">Executive & Kernel</p>","children":[],"payload":{"lines":"2963,2965"}},{"content":"\n<p data-lines=\"2965,2966\">Hardware Abstraction Layer (HAL)</p>","children":[],"payload":{"lines":"2965,2967"}},{"content":"\n<p data-lines=\"2967,2968\">Privilege Rings</p>","children":[],"payload":{"lines":"2967,2969"}},{"content":"\n<p data-lines=\"2969,2970\">Key Data Structures</p>","children":[],"payload":{"lines":"2969,2971"}}],"payload":{"lines":"2959,2971"}},{"content":"\n<p data-lines=\"2971,2972\">Memory Management</p>","children":[{"content":"\n<p data-lines=\"2973,2974\">Virtual Address Space</p>","children":[],"payload":{"lines":"2973,2975"}},{"content":"\n<p data-lines=\"2975,2976\">Memory Pool & Pool Allocator</p>","children":[],"payload":{"lines":"2975,2977"}}],"payload":{"lines":"2971,2977"}},{"content":"\n<p data-lines=\"2977,2978\">Windows Driver Basics</p>","children":[{"content":"\n<p data-lines=\"2979,2980\">I/O Request Packet (IRP)</p>","children":[],"payload":{"lines":"2979,2981"}},{"content":"\n<p data-lines=\"2981,2982\">I/O Control Code (IOCTL)</p>","children":[],"payload":{"lines":"2981,2983"}},{"content":"\n<p data-lines=\"2983,2984\">Data Buffering (Buffered I/O, Direct I/O, Neither Buffered Nor Direct I/O)</p>","children":[],"payload":{"lines":"2983,2985"}}],"payload":{"lines":"2977,2985"}},{"content":"\n<p data-lines=\"2985,2986\">Fuzzing Windows Drivers</p>","children":[{"content":"\n<p data-lines=\"2987,2988\">Locating IOCTLs in Windows Drivers</p>","children":[],"payload":{"lines":"2987,2989"}},{"content":"\n<p data-lines=\"2989,2990\">Locating input entry points</p>","children":[],"payload":{"lines":"2989,2991"}},{"content":"\n<p data-lines=\"2991,2992\">Writing scripts to fuzz the discovered IOCTLs</p>","children":[],"payload":{"lines":"2991,2993"}},{"content":"\n<p data-lines=\"2993,2994\">Playing with public fuzzers</p>","children":[],"payload":{"lines":"2993,2995"}}],"payload":{"lines":"2985,2995"}},{"content":"\n<p data-lines=\"2995,2996\">Exploitation</p>","children":[{"content":"\n<p data-lines=\"2997,2998\">Stack Buffer Overflow (SMEP & KPTI Enabled)</p>","children":[{"content":"\n<p data-lines=\"2999,3000\">Understand the Vulnerability</p>","children":[],"payload":{"lines":"2999,3001"}},{"content":"\n<p data-lines=\"3001,3002\">Achieving Code Execution</p>","children":[],"payload":{"lines":"3001,3003"}}],"payload":{"lines":"2997,3003"}},{"content":"\n<p data-lines=\"3003,3004\">Arbitrary Memory Overwrite</p>","children":[],"payload":{"lines":"3003,3005"}},{"content":"\n<p data-lines=\"3005,3006\">Memory Disclosure</p>","children":[{"content":"\n<p data-lines=\"3007,3008\">Understand the Vulnerability</p>","children":[],"payload":{"lines":"3007,3009"}},{"content":"\n<p data-lines=\"3009,3010\">Leak Function Pointer</p>","children":[],"payload":{"lines":"3009,3011"}},{"content":"\n<p data-lines=\"3011,3012\">Calculate Driver Base Address</p>","children":[],"payload":{"lines":"3011,3013"}}],"payload":{"lines":"3005,3013"}},{"content":"\n<p data-lines=\"3013,3014\">Pool Overflow</p>","children":[{"content":"\n<p data-lines=\"3015,3016\">Understand the Vulnerability</p>","children":[],"payload":{"lines":"3015,3017"}},{"content":"\n<p data-lines=\"3017,3018\">Finding Corruption Target</p>","children":[],"payload":{"lines":"3017,3019"}},{"content":"\n<p data-lines=\"3019,3020\">Grooming Target Pool</p>","children":[],"payload":{"lines":"3019,3021"}},{"content":"\n<p data-lines=\"3021,3022\">Achieving Arbitrary Read/Write Primitive (data-only attack)</p>","children":[],"payload":{"lines":"3021,3023"}},{"content":"\n<p data-lines=\"3023,3024\">Gaining local privilege escalation</p>","children":[],"payload":{"lines":"3023,3025"}}],"payload":{"lines":"3013,3025"}},{"content":"\n<p data-lines=\"3025,3026\">Achieving Arbitrary Read/Write Primitive (data-only attack)</p>","children":[],"payload":{"lines":"3025,3027"}}],"payload":{"lines":"2995,3027"}},{"content":"\n<p data-lines=\"3027,3028\">Kernel Payload</p>","children":[{"content":"\n<p data-lines=\"3029,3030\">Escalate Privilege of a Process from Kernel Debugger</p>","children":[],"payload":{"lines":"3029,3031"}},{"content":"\n<p data-lines=\"3031,3032\">Considerations while writing Escalation of Privilege Payload</p>","children":[],"payload":{"lines":"3031,3033"}},{"content":"\n<p data-lines=\"3033,3034\">Kernel Recovery (Fixating Kernel State after exploitation)</p>","children":[],"payload":{"lines":"3033,3035"}}],"payload":{"lines":"3027,3035"}},{"content":"\n<p data-lines=\"3035,3036\">Exploit Mitigations</p>","children":[{"content":"\n<p data-lines=\"3037,3038\">Kernel Address Space Layout Randomization (kASLR)</p>","children":[],"payload":{"lines":"3037,3039"}},{"content":"\n<p data-lines=\"3039,3040\">Supervisor Mode Execution Prevention (SMEP)</p>","children":[],"payload":{"lines":"3039,3041"}},{"content":"\n<p data-lines=\"3041,3042\">Kernel Page Table Isolation (KPTI/KVA Shadow)</p>","children":[],"payload":{"lines":"3041,3043"}}],"payload":{"lines":"3035,3043"}},{"content":"\n<p data-lines=\"3043,3044\">Pool Manager</p>","children":[{"content":"\n<p data-lines=\"3045,3046\">Internals (kLFH)</p>","children":[],"payload":{"lines":"3045,3047"}},{"content":"\n<p data-lines=\"3047,3048\">Feng-Shui</p>","children":[],"payload":{"lines":"3047,3049"}}],"payload":{"lines":"3043,3049"}}],"payload":{"lines":"2949,3049"}},{"content":"\n<p data-lines=\"3049,3050\">Linux</p>","children":[{"content":"\n<p data-lines=\"3051,3052\">Introduction</p>","children":[{"content":"\n<p data-lines=\"3053,3054\">User-Space vs Kernel-Space</p>","children":[],"payload":{"lines":"3053,3055"}},{"content":"\n<p data-lines=\"3055,3056\">x86/x64 Architecture</p>","children":[],"payload":{"lines":"3055,3057"}},{"content":"\n<p data-lines=\"3057,3058\">User-Space Processes</p>","children":[],"payload":{"lines":"3057,3059"}},{"content":"\n<p data-lines=\"3059,3060\">Virtual Memory Management</p>","children":[],"payload":{"lines":"3059,3061"}},{"content":"\n<p data-lines=\"3061,3062\">Linux Privileges Model</p>","children":[],"payload":{"lines":"3061,3063"}}],"payload":{"lines":"3051,3063"}},{"content":"\n<p data-lines=\"3063,3064\">Setting up the Debugging ENV</p>","children":[{"content":"\n<p data-lines=\"3065,3066\">Kernel Debugging Techniques</p>","children":[],"payload":{"lines":"3065,3067"}},{"content":"\n<p data-lines=\"3067,3068\">Remote Kernel Debugging with GDB</p>","children":[],"payload":{"lines":"3067,3069"}},{"content":"\n<p data-lines=\"3069,3070\">Module Debugging</p>","children":[],"payload":{"lines":"3069,3071"}}],"payload":{"lines":"3063,3071"}},{"content":"\n<p data-lines=\"3071,3072\">Privilege Escalation</p>","children":[{"content":"\n<p data-lines=\"3073,3074\">Modern Distributions</p>","children":[],"payload":{"lines":"3073,3075"}},{"content":"\n<p data-lines=\"3075,3076\">Heuristics</p>","children":[],"payload":{"lines":"3075,3077"}},{"content":"\n<p data-lines=\"3077,3078\">RET2USR Attacks</p>","children":[],"payload":{"lines":"3077,3079"}}],"payload":{"lines":"3071,3079"}},{"content":"\n<p data-lines=\"3079,3080\">Arbitrary Read/Write Primitives</p>","children":[{"content":"\n<p data-lines=\"3081,3082\">Interrupt Descriptor Table Overwrites</p>","children":[],"payload":{"lines":"3081,3083"}},{"content":"\n<p data-lines=\"3083,3084\">Triggering the Vulnerability</p>","children":[],"payload":{"lines":"3083,3085"}},{"content":"\n<p data-lines=\"3085,3086\">Recovering the Kernel State</p>","children":[],"payload":{"lines":"3085,3087"}}],"payload":{"lines":"3079,3087"}},{"content":"\n<p data-lines=\"3087,3088\">Information Disclosure</p>","children":[{"content":"\n<p data-lines=\"3089,3090\">Kernel Memory Addressing Disclosures</p>","children":[],"payload":{"lines":"3089,3091"}},{"content":"\n<p data-lines=\"3091,3092\">Memory Leaks and addr_limit User/Kernel Boundary</p>","children":[],"payload":{"lines":"3091,3093"}}],"payload":{"lines":"3087,3093"}},{"content":"\n<p data-lines=\"3093,3094\">Partially-Controlled and Uncontrolled Read/Write Primitives</p>","children":[],"payload":{"lines":"3093,3095"}},{"content":"\n<p data-lines=\"3095,3096\">Out of Bounds Access Vulnerabilities</p>","children":[],"payload":{"lines":"3095,3097"}},{"content":"\n<p data-lines=\"3097,3098\">Integer Vulnerabilities</p>","children":[{"content":"\n<p data-lines=\"3099,3100\">Signedness Issues</p>","children":[],"payload":{"lines":"3099,3101"}},{"content":"\n<p data-lines=\"3101,3102\">Integer Overflows</p>","children":[],"payload":{"lines":"3101,3103"}}],"payload":{"lines":"3097,3103"}},{"content":"\n<p data-lines=\"3103,3104\">Kernel Stack Overflows</p>","children":[],"payload":{"lines":"3103,3105"}},{"content":"\n<p data-lines=\"3105,3106\">Dynamic Memory Management/SLAB Allocator</p>","children":[{"content":"\n<p data-lines=\"3107,3108\">Generic SLAB Concepts</p>","children":[],"payload":{"lines":"3107,3109"}},{"content":"\n<p data-lines=\"3109,3110\">Linux SLUB Allocator</p>","children":[],"payload":{"lines":"3109,3111"}}],"payload":{"lines":"3105,3111"}},{"content":"\n<p data-lines=\"3111,3112\">Heap Vulnerabilities</p>","children":[{"content":"\n<p data-lines=\"3113,3114\">Use-After-Free Vulnerabilities</p>","children":[],"payload":{"lines":"3113,3115"}},{"content":"\n<p data-lines=\"3115,3116\">Overflowing into Adjacent Objects</p>","children":[],"payload":{"lines":"3115,3117"}},{"content":"\n<p data-lines=\"3117,3118\">Off-by-[one/X]</p>","children":[],"payload":{"lines":"3117,3119"}}],"payload":{"lines":"3111,3119"}},{"content":"\n<p data-lines=\"3119,3120\">Reliable UAF Exploitation on SMP Systems</p>","children":[],"payload":{"lines":"3119,3121"}},{"content":"\n<p data-lines=\"3121,3122\">Kernel Return-Oriented Programming</p>","children":[],"payload":{"lines":"3121,3123"}},{"content":"\n<p data-lines=\"3123,3124\">Bypassing Supervisor Mode Execution Protection</p>","children":[],"payload":{"lines":"3123,3125"}}],"payload":{"lines":"3049,3125"}}],"payload":{"lines":"2947,3125"}},{"content":"\n<p data-lines=\"3125,3126\">Hijack Execution Flow</p>","children":[],"payload":{"lines":"3125,3127"}},{"content":"\n<p data-lines=\"3127,3128\">Process Injection</p>","children":[],"payload":{"lines":"3127,3129"}},{"content":"\n<p data-lines=\"3129,3130\">Scheduled Task/Job</p>","children":[],"payload":{"lines":"3129,3131"}},{"content":"\n<p data-lines=\"3131,3132\">Valid Accounts</p>","children":[],"payload":{"lines":"3131,3133"}}],"payload":{"lines":"2929,3133"}},{"content":"\n<p data-lines=\"3133,3134\">Defense Evasion</p>","children":[{"content":"\n<p data-lines=\"3135,3136\">Abuse Elevation Control Mechanism</p>","children":[],"payload":{"lines":"3135,3137"}},{"content":"\n<p data-lines=\"3137,3138\">Access Token Manipulation</p>","children":[],"payload":{"lines":"3137,3139"}},{"content":"\n<p data-lines=\"3139,3140\">BITS Jobs</p>","children":[],"payload":{"lines":"3139,3141"}},{"content":"\n<p data-lines=\"3141,3142\">Build Image on Host</p>","children":[],"payload":{"lines":"3141,3143"}},{"content":"\n<p data-lines=\"3143,3144\">Debugger Evasion</p>","children":[],"payload":{"lines":"3143,3145"}},{"content":"\n<p data-lines=\"3145,3146\">Deobfuscate/Decode Files or Information</p>","children":[],"payload":{"lines":"3145,3147"}},{"content":"\n<p data-lines=\"3147,3148\">Deploy Container</p>","children":[],"payload":{"lines":"3147,3149"}},{"content":"\n<p data-lines=\"3149,3150\">Direct Volume Access</p>","children":[],"payload":{"lines":"3149,3151"}},{"content":"\n<p data-lines=\"3151,3152\">Domain Policy Modification</p>","children":[],"payload":{"lines":"3151,3153"}},{"content":"\n<p data-lines=\"3153,3154\">Execution Guardrails</p>","children":[],"payload":{"lines":"3153,3155"}},{"content":"\n<p data-lines=\"3155,3156\">Exploitation for Defense Evasion</p>","children":[],"payload":{"lines":"3155,3157"}},{"content":"\n<p data-lines=\"3157,3158\">File and Directory Permissions Modification</p>","children":[],"payload":{"lines":"3157,3159"}},{"content":"\n<p data-lines=\"3159,3160\">Hide Artifacts</p>","children":[],"payload":{"lines":"3159,3161"}},{"content":"\n<p data-lines=\"3161,3162\">Hijack Execution Flow</p>","children":[],"payload":{"lines":"3161,3163"}},{"content":"\n<p data-lines=\"3163,3164\">Impair Defenses</p>","children":[],"payload":{"lines":"3163,3165"}},{"content":"\n<p data-lines=\"3165,3166\">Indicator Removal</p>","children":[],"payload":{"lines":"3165,3167"}},{"content":"\n<p data-lines=\"3167,3168\">Indirect Command Execution</p>","children":[],"payload":{"lines":"3167,3169"}},{"content":"\n<p data-lines=\"3169,3170\">Masquerading</p>","children":[],"payload":{"lines":"3169,3171"}},{"content":"\n<p data-lines=\"3171,3172\">Modify Authentication Process</p>","children":[],"payload":{"lines":"3171,3173"}},{"content":"\n<p data-lines=\"3173,3174\">Modify Cloud Compute Infrastructure</p>","children":[],"payload":{"lines":"3173,3175"}},{"content":"\n<p data-lines=\"3175,3176\">Modify Registry</p>","children":[],"payload":{"lines":"3175,3177"}},{"content":"\n<p data-lines=\"3177,3178\">Modify System Image</p>","children":[],"payload":{"lines":"3177,3179"}},{"content":"\n<p data-lines=\"3179,3180\">Network Boundary Bridging</p>","children":[],"payload":{"lines":"3179,3181"}},{"content":"\n<p data-lines=\"3181,3182\">Obfuscated Files or Information</p>","children":[],"payload":{"lines":"3181,3183"}},{"content":"\n<p data-lines=\"3183,3184\">Plist File Modification</p>","children":[],"payload":{"lines":"3183,3185"}},{"content":"\n<p data-lines=\"3185,3186\">Pre-OS Boot</p>","children":[],"payload":{"lines":"3185,3187"}},{"content":"\n<p data-lines=\"3187,3188\">Process Injection</p>","children":[],"payload":{"lines":"3187,3189"}},{"content":"\n<p data-lines=\"3189,3190\">Reflective Code Loading</p>","children":[],"payload":{"lines":"3189,3191"}},{"content":"\n<p data-lines=\"3191,3192\">Rogue Domain Controller</p>","children":[],"payload":{"lines":"3191,3193"}},{"content":"\n<p data-lines=\"3193,3194\">Rootkit</p>","children":[],"payload":{"lines":"3193,3195"}},{"content":"\n<p data-lines=\"3195,3196\">Subvert Trust Controls</p>","children":[],"payload":{"lines":"3195,3197"}},{"content":"\n<p data-lines=\"3197,3198\">System Binary Proxy Execution</p>","children":[],"payload":{"lines":"3197,3199"}},{"content":"\n<p data-lines=\"3199,3200\">System Script Proxy Execution</p>","children":[],"payload":{"lines":"3199,3201"}},{"content":"\n<p data-lines=\"3201,3202\">Template Injection</p>","children":[],"payload":{"lines":"3201,3203"}},{"content":"\n<p data-lines=\"3203,3204\">Traffic Signaling</p>","children":[],"payload":{"lines":"3203,3205"}},{"content":"\n<p data-lines=\"3205,3206\">Trusted Developer Utilities Proxy Execution</p>","children":[],"payload":{"lines":"3205,3207"}},{"content":"\n<p data-lines=\"3207,3208\">Unused/Unsupported Cloud Regions</p>","children":[],"payload":{"lines":"3207,3209"}},{"content":"\n<p data-lines=\"3209,3210\">Use Alternate Authentication Material</p>","children":[],"payload":{"lines":"3209,3211"}},{"content":"\n<p data-lines=\"3211,3212\">Valid Accounts</p>","children":[],"payload":{"lines":"3211,3213"}},{"content":"\n<p data-lines=\"3213,3214\">Virtualization/Sandbox Evasion</p>","children":[],"payload":{"lines":"3213,3215"}},{"content":"\n<p data-lines=\"3215,3216\">Weaken Encryption</p>","children":[],"payload":{"lines":"3215,3217"}},{"content":"\n<p data-lines=\"3217,3218\">XSL Script Processing</p>","children":[],"payload":{"lines":"3217,3219"}}],"payload":{"lines":"3133,3219"}},{"content":"\n<p data-lines=\"3219,3220\">Credential Access</p>","children":[{"content":"\n<p data-lines=\"3221,3222\">Adversary-in-the-Middle</p>","children":[],"payload":{"lines":"3221,3223"}},{"content":"\n<p data-lines=\"3223,3224\">Brute Force</p>","children":[],"payload":{"lines":"3223,3225"}},{"content":"\n<p data-lines=\"3225,3226\">Credentials from Password Stores</p>","children":[],"payload":{"lines":"3225,3227"}},{"content":"\n<p data-lines=\"3227,3228\">Exploitation for Credential Access</p>","children":[],"payload":{"lines":"3227,3229"}},{"content":"\n<p data-lines=\"3229,3230\">Forced Authentication</p>","children":[],"payload":{"lines":"3229,3231"}},{"content":"\n<p data-lines=\"3231,3232\">Forge Web Credentials</p>","children":[],"payload":{"lines":"3231,3233"}},{"content":"\n<p data-lines=\"3233,3234\">Input Capture</p>","children":[],"payload":{"lines":"3233,3235"}},{"content":"\n<p data-lines=\"3235,3236\">Modify Authentication Process</p>","children":[],"payload":{"lines":"3235,3237"}},{"content":"\n<p data-lines=\"3237,3238\">Multi-Factor Authentication Interception</p>","children":[],"payload":{"lines":"3237,3239"}},{"content":"\n<p data-lines=\"3239,3240\">Multi-Factor Authentication Request Generation</p>","children":[],"payload":{"lines":"3239,3241"}},{"content":"\n<p data-lines=\"3241,3242\">Network Sniffing</p>","children":[],"payload":{"lines":"3241,3243"}},{"content":"\n<p data-lines=\"3243,3244\">OS Credential Dumping</p>","children":[],"payload":{"lines":"3243,3245"}},{"content":"\n<p data-lines=\"3245,3246\">Steal Application Access Token</p>","children":[],"payload":{"lines":"3245,3247"}},{"content":"\n<p data-lines=\"3247,3248\">Steal or Forge Authentication Certificates</p>","children":[],"payload":{"lines":"3247,3249"}},{"content":"\n<p data-lines=\"3249,3250\">Steal or Forge Kerberos Tickets</p>","children":[],"payload":{"lines":"3249,3251"}},{"content":"\n<p data-lines=\"3251,3252\">Steal Web Session Cookie</p>","children":[],"payload":{"lines":"3251,3253"}},{"content":"\n<p data-lines=\"3253,3254\">Unsecured Credentials</p>","children":[],"payload":{"lines":"3253,3255"}}],"payload":{"lines":"3219,3255"}},{"content":"\n<p data-lines=\"3255,3256\">Discovery</p>","children":[{"content":"\n<p data-lines=\"3257,3258\">Account Discovery</p>","children":[],"payload":{"lines":"3257,3259"}},{"content":"\n<p data-lines=\"3259,3260\">Application Window Discovery</p>","children":[],"payload":{"lines":"3259,3261"}},{"content":"\n<p data-lines=\"3261,3262\">Browser Bookmark Discovery</p>","children":[],"payload":{"lines":"3261,3263"}},{"content":"\n<p data-lines=\"3263,3264\">Cloud Infrastructure Discovery</p>","children":[],"payload":{"lines":"3263,3265"}},{"content":"\n<p data-lines=\"3265,3266\">Cloud Service Dashboard</p>","children":[],"payload":{"lines":"3265,3267"}},{"content":"\n<p data-lines=\"3267,3268\">Cloud Service Discovery</p>","children":[],"payload":{"lines":"3267,3269"}},{"content":"\n<p data-lines=\"3269,3270\">Cloud Storage Object Discovery</p>","children":[],"payload":{"lines":"3269,3271"}},{"content":"\n<p data-lines=\"3271,3272\">Container and Resource Discovery</p>","children":[],"payload":{"lines":"3271,3273"}},{"content":"\n<p data-lines=\"3273,3274\">Debugger Evasion</p>","children":[],"payload":{"lines":"3273,3275"}},{"content":"\n<p data-lines=\"3275,3276\">Domain Trust Discovery</p>","children":[],"payload":{"lines":"3275,3277"}},{"content":"\n<p data-lines=\"3277,3278\">File and Directory Discovery</p>","children":[],"payload":{"lines":"3277,3279"}},{"content":"\n<p data-lines=\"3279,3280\">Group Policy Discovery</p>","children":[],"payload":{"lines":"3279,3281"}},{"content":"\n<p data-lines=\"3281,3282\">Network Service Discovery</p>","children":[],"payload":{"lines":"3281,3283"}},{"content":"\n<p data-lines=\"3283,3284\">Network Share Discovery</p>","children":[],"payload":{"lines":"3283,3285"}},{"content":"\n<p data-lines=\"3285,3286\">Network Sniffing</p>","children":[],"payload":{"lines":"3285,3287"}},{"content":"\n<p data-lines=\"3287,3288\">Password Policy Discovery</p>","children":[],"payload":{"lines":"3287,3289"}},{"content":"\n<p data-lines=\"3289,3290\">Peripheral Device Discovery</p>","children":[],"payload":{"lines":"3289,3291"}},{"content":"\n<p data-lines=\"3291,3292\">Permission Groups Discovery</p>","children":[],"payload":{"lines":"3291,3293"}},{"content":"\n<p data-lines=\"3293,3294\">Process Discovery</p>","children":[],"payload":{"lines":"3293,3295"}},{"content":"\n<p data-lines=\"3295,3296\">Query Registry</p>","children":[],"payload":{"lines":"3295,3297"}},{"content":"\n<p data-lines=\"3297,3298\">Remote System Discovery</p>","children":[],"payload":{"lines":"3297,3299"}},{"content":"\n<p data-lines=\"3299,3300\">Software Discovery</p>","children":[],"payload":{"lines":"3299,3301"}},{"content":"\n<p data-lines=\"3301,3302\">System Information Discovery</p>","children":[],"payload":{"lines":"3301,3303"}},{"content":"\n<p data-lines=\"3303,3304\">System Location Discovery</p>","children":[],"payload":{"lines":"3303,3305"}},{"content":"\n<p data-lines=\"3305,3306\">System Network Configuration Discovery</p>","children":[],"payload":{"lines":"3305,3307"}},{"content":"\n<p data-lines=\"3307,3308\">System Network Connections Discovery</p>","children":[],"payload":{"lines":"3307,3309"}},{"content":"\n<p data-lines=\"3309,3310\">System Owner/User Discovery</p>","children":[],"payload":{"lines":"3309,3311"}},{"content":"\n<p data-lines=\"3311,3312\">System Service Discovery</p>","children":[],"payload":{"lines":"3311,3313"}},{"content":"\n<p data-lines=\"3313,3314\">System Time Discovery</p>","children":[],"payload":{"lines":"3313,3315"}},{"content":"\n<p data-lines=\"3315,3316\">Virtualization/Sandbox Evasion</p>","children":[],"payload":{"lines":"3315,3317"}}],"payload":{"lines":"3255,3317"}},{"content":"\n<p data-lines=\"3317,3318\">Lateral Movement</p>","children":[{"content":"\n<p data-lines=\"3319,3320\">Exploitation of Remote Services</p>","children":[],"payload":{"lines":"3319,3321"}},{"content":"\n<p data-lines=\"3321,3322\">Internal Spearphishing</p>","children":[],"payload":{"lines":"3321,3323"}},{"content":"\n<p data-lines=\"3323,3324\">Lateral Tool Transfer</p>","children":[],"payload":{"lines":"3323,3325"}},{"content":"\n<p data-lines=\"3325,3326\">Remote Service Session Hijacking</p>","children":[],"payload":{"lines":"3325,3327"}},{"content":"\n<p data-lines=\"3327,3328\">Remote Services</p>","children":[],"payload":{"lines":"3327,3329"}},{"content":"\n<p data-lines=\"3329,3330\">Replication Through Removable Media</p>","children":[],"payload":{"lines":"3329,3331"}},{"content":"\n<p data-lines=\"3331,3332\">Software Deployment Tools</p>","children":[],"payload":{"lines":"3331,3333"}},{"content":"\n<p data-lines=\"3333,3334\">Taint Shared Content</p>","children":[],"payload":{"lines":"3333,3335"}},{"content":"\n<p data-lines=\"3335,3336\">Use Alternate Authentication Material</p>","children":[],"payload":{"lines":"3335,3337"}}],"payload":{"lines":"3317,3337"}},{"content":"\n<p data-lines=\"3337,3338\">Collection</p>","children":[{"content":"\n<p data-lines=\"3339,3340\">Adversary-in-the-Middle</p>","children":[],"payload":{"lines":"3339,3341"}},{"content":"\n<p data-lines=\"3341,3342\">Archive Collected Data</p>","children":[],"payload":{"lines":"3341,3343"}},{"content":"\n<p data-lines=\"3343,3344\">Audio Capture</p>","children":[],"payload":{"lines":"3343,3345"}},{"content":"\n<p data-lines=\"3345,3346\">Automated Collection</p>","children":[],"payload":{"lines":"3345,3347"}},{"content":"\n<p data-lines=\"3347,3348\">Browser Session Hijacking</p>","children":[],"payload":{"lines":"3347,3349"}},{"content":"\n<p data-lines=\"3349,3350\">Clipboard Data</p>","children":[],"payload":{"lines":"3349,3351"}},{"content":"\n<p data-lines=\"3351,3352\">Data from Cloud Storage</p>","children":[],"payload":{"lines":"3351,3353"}},{"content":"\n<p data-lines=\"3353,3354\">Data from Configuration Repository</p>","children":[],"payload":{"lines":"3353,3355"}},{"content":"\n<p data-lines=\"3355,3356\">Data from Information Repositories</p>","children":[],"payload":{"lines":"3355,3357"}},{"content":"\n<p data-lines=\"3357,3358\">Data from Local System</p>","children":[],"payload":{"lines":"3357,3359"}},{"content":"\n<p data-lines=\"3359,3360\">Data from Network Shared Drive</p>","children":[],"payload":{"lines":"3359,3361"}},{"content":"\n<p data-lines=\"3361,3362\">Data from Removable Media</p>","children":[],"payload":{"lines":"3361,3363"}},{"content":"\n<p data-lines=\"3363,3364\">Data Staged</p>","children":[],"payload":{"lines":"3363,3365"}},{"content":"\n<p data-lines=\"3365,3366\">Email Collection</p>","children":[],"payload":{"lines":"3365,3367"}},{"content":"\n<p data-lines=\"3367,3368\">Input Capture</p>","children":[],"payload":{"lines":"3367,3369"}},{"content":"\n<p data-lines=\"3369,3370\">Screen Capture</p>","children":[],"payload":{"lines":"3369,3371"}},{"content":"\n<p data-lines=\"3371,3372\">Video Capture</p>","children":[],"payload":{"lines":"3371,3373"}}],"payload":{"lines":"3337,3373"}},{"content":"\n<p data-lines=\"3373,3374\">Command and Control</p>","children":[{"content":"\n<p data-lines=\"3375,3376\">Application Layer Protocol</p>","children":[],"payload":{"lines":"3375,3377"}},{"content":"\n<p data-lines=\"3377,3378\">Communication Through Removable Media</p>","children":[],"payload":{"lines":"3377,3379"}},{"content":"\n<p data-lines=\"3379,3380\">Data Encoding</p>","children":[],"payload":{"lines":"3379,3381"}},{"content":"\n<p data-lines=\"3381,3382\">Data Obfuscation</p>","children":[],"payload":{"lines":"3381,3383"}},{"content":"\n<p data-lines=\"3383,3384\">Dynamic Resolution</p>","children":[],"payload":{"lines":"3383,3385"}},{"content":"\n<p data-lines=\"3385,3386\">Encrypted Channel</p>","children":[],"payload":{"lines":"3385,3387"}},{"content":"\n<p data-lines=\"3387,3388\">Fallback Channels</p>","children":[],"payload":{"lines":"3387,3389"}},{"content":"\n<p data-lines=\"3389,3390\">Ingress Tool Transfer</p>","children":[],"payload":{"lines":"3389,3391"}},{"content":"\n<p data-lines=\"3391,3392\">Multi-Stage Channels</p>","children":[],"payload":{"lines":"3391,3393"}},{"content":"\n<p data-lines=\"3393,3394\">Non-Application Layer Protocol</p>","children":[],"payload":{"lines":"3393,3395"}},{"content":"\n<p data-lines=\"3395,3396\">Non-Standard Port</p>","children":[],"payload":{"lines":"3395,3397"}},{"content":"\n<p data-lines=\"3397,3398\">Protocol Tunneling</p>","children":[],"payload":{"lines":"3397,3399"}},{"content":"\n<p data-lines=\"3399,3400\">Proxy</p>","children":[],"payload":{"lines":"3399,3401"}},{"content":"\n<p data-lines=\"3401,3402\">Remote Access Software</p>","children":[],"payload":{"lines":"3401,3403"}},{"content":"\n<p data-lines=\"3403,3404\">Traffic Signaling</p>","children":[],"payload":{"lines":"3403,3405"}},{"content":"\n<p data-lines=\"3405,3406\">Web Service</p>","children":[],"payload":{"lines":"3405,3407"}}],"payload":{"lines":"3373,3407"}},{"content":"\n<p data-lines=\"3407,3408\">Exfiltration</p>","children":[{"content":"\n<p data-lines=\"3409,3410\">Automated Exfiltration</p>","children":[],"payload":{"lines":"3409,3411"}},{"content":"\n<p data-lines=\"3411,3412\">Data Transfer Size Limits</p>","children":[],"payload":{"lines":"3411,3413"}},{"content":"\n<p data-lines=\"3413,3414\">Exfiltration Over Alternative Protocol</p>","children":[],"payload":{"lines":"3413,3415"}},{"content":"\n<p data-lines=\"3415,3416\">Exfiltration Over C2 Channel</p>","children":[],"payload":{"lines":"3415,3417"}},{"content":"\n<p data-lines=\"3417,3418\">Exfiltration Over Other Network Medium</p>","children":[],"payload":{"lines":"3417,3419"}},{"content":"\n<p data-lines=\"3419,3420\">Exfiltration Over Physical Medium</p>","children":[],"payload":{"lines":"3419,3421"}},{"content":"\n<p data-lines=\"3421,3422\">Exfiltration Over Web Service</p>","children":[],"payload":{"lines":"3421,3423"}},{"content":"\n<p data-lines=\"3423,3424\">Scheduled Transfer</p>","children":[],"payload":{"lines":"3423,3425"}},{"content":"\n<p data-lines=\"3425,3426\">Transfer Data to Cloud Account</p>","children":[],"payload":{"lines":"3425,3427"}}],"payload":{"lines":"3407,3427"}},{"content":"\n<p data-lines=\"3427,3428\">Impact</p>","children":[{"content":"\n<p data-lines=\"3429,3430\">Account Access Removal</p>","children":[],"payload":{"lines":"3429,3431"}},{"content":"\n<p data-lines=\"3431,3432\">Data Destruction</p>","children":[],"payload":{"lines":"3431,3433"}},{"content":"\n<p data-lines=\"3433,3434\">Data Encrypted for Impact</p>","children":[],"payload":{"lines":"3433,3435"}},{"content":"\n<p data-lines=\"3435,3436\">Data Manipulation</p>","children":[],"payload":{"lines":"3435,3437"}},{"content":"\n<p data-lines=\"3437,3438\">Defacement</p>","children":[],"payload":{"lines":"3437,3439"}},{"content":"\n<p data-lines=\"3439,3440\">Disk Wipe</p>","children":[],"payload":{"lines":"3439,3441"}},{"content":"\n<p data-lines=\"3441,3442\">Endpoint Denial of Service</p>","children":[],"payload":{"lines":"3441,3443"}},{"content":"\n<p data-lines=\"3443,3444\">Firmware Corruption</p>","children":[],"payload":{"lines":"3443,3445"}},{"content":"\n<p data-lines=\"3445,3446\">Inhibit System Recovery</p>","children":[],"payload":{"lines":"3445,3447"}},{"content":"\n<p data-lines=\"3447,3448\">Network Denial of Service</p>","children":[],"payload":{"lines":"3447,3449"}},{"content":"\n<p data-lines=\"3449,3450\">Resource Hijacking</p>","children":[],"payload":{"lines":"3449,3451"}},{"content":"\n<p data-lines=\"3451,3452\">Service Stop</p>","children":[],"payload":{"lines":"3451,3453"}},{"content":"\n<p data-lines=\"3453,3454\">System Shutdown/Reboot</p>","children":[],"payload":{"lines":"3453,3455"}}],"payload":{"lines":"3427,3455"}}],"payload":{"lines":"2599,3455"}}],"payload":{"lines":"2567,3455"}},{"content":"\n<p data-lines=\"3455,3456\">Mobile</p>","children":[{"content":"\n<p data-lines=\"3457,3458\">Prerequisites</p>","children":[{"content":"\n<p data-lines=\"3459,3460\">Basics of Network</p>","children":[],"payload":{"lines":"3459,3461"}},{"content":"\n<p data-lines=\"3461,3462\">Basics of Linux</p>","children":[],"payload":{"lines":"3461,3463"}},{"content":"\n<p data-lines=\"3463,3464\">Basics of Java</p>","children":[],"payload":{"lines":"3463,3465"}},{"content":"\n<p data-lines=\"3465,3466\">Basics of Objective-C</p>","children":[],"payload":{"lines":"3465,3467"}},{"content":"\n<p data-lines=\"3467,3468\">Professional Python</p>","children":[],"payload":{"lines":"3467,3469"}},{"content":"\n<p data-lines=\"3469,3470\">Professional C/C++</p>","children":[],"payload":{"lines":"3469,3471"}},{"content":"\n<p data-lines=\"3471,3472\">ARM/ARM64 Assembly</p>","children":[],"payload":{"lines":"3471,3473"}}],"payload":{"lines":"3457,3473"}},{"content":"\n<p data-lines=\"3473,3474\">Syllabus</p>","children":[{"content":"\n<p data-lines=\"3475,3476\">Initial Access</p>","children":[{"content":"\n<p data-lines=\"3477,3478\">Application Versioning</p>","children":[],"payload":{"lines":"3477,3479"}},{"content":"\n<p data-lines=\"3479,3480\">Drive-By Compromise</p>","children":[],"payload":{"lines":"3479,3481"}},{"content":"\n<p data-lines=\"3481,3482\">Lockscreen Bypass</p>","children":[],"payload":{"lines":"3481,3483"}},{"content":"\n<p data-lines=\"3483,3484\">Phishing</p>","children":[],"payload":{"lines":"3483,3485"}},{"content":"\n<p data-lines=\"3485,3486\">Replication Through Removable Media</p>","children":[],"payload":{"lines":"3485,3487"}},{"content":"\n<p data-lines=\"3487,3488\">Supply Chain Compromise</p>","children":[{"content":"\n<p data-lines=\"3489,3490\">Compromise Software Dependencies and Development Tools</p>","children":[],"payload":{"lines":"3489,3491"}},{"content":"\n<p data-lines=\"3491,3492\">Compromise Hardware Supply Chain</p>","children":[],"payload":{"lines":"3491,3493"}},{"content":"\n<p data-lines=\"3493,3494\">Compromise Software Supply Chain</p>","children":[],"payload":{"lines":"3493,3495"}}],"payload":{"lines":"3487,3495"}}],"payload":{"lines":"3475,3495"}},{"content":"\n<p data-lines=\"3495,3496\">Execution</p>","children":[{"content":"\n<p data-lines=\"3497,3498\">Command and Scripting Interpreter</p>","children":[{"content":"Unix Shell","children":[],"payload":{"lines":"3499,3501"}}],"payload":{"lines":"3497,3501"}},{"content":"\n<p data-lines=\"3501,3502\">Exploitation for Client Execution</p>","children":[{"content":"\n<p data-lines=\"3503,3504\">iOS</p>","children":[{"content":"\n<p data-lines=\"3505,3506\">Introduction</p>","children":[{"content":"\n<p data-lines=\"3507,3508\">How to set up your Mac and Device for Vuln Research/Exploit Development</p>","children":[],"payload":{"lines":"3507,3509"}},{"content":"\n<p data-lines=\"3509,3510\">iOS Userspace Memory Layout</p>","children":[],"payload":{"lines":"3509,3511"}},{"content":"\n<p data-lines=\"3511,3512\">Dynamic Loading Frameworks, Libraries and ASLR</p>","children":[],"payload":{"lines":"3511,3513"}},{"content":"\n<p data-lines=\"3513,3514\">iOS Sandboxing and Inter Process Communication</p>","children":[],"payload":{"lines":"3513,3515"}},{"content":"\n<p data-lines=\"3515,3516\">Userspace Exploit Mitigations</p>","children":[],"payload":{"lines":"3515,3517"}},{"content":"\n<p data-lines=\"3517,3518\">Userspace Attack Surface</p>","children":[],"payload":{"lines":"3517,3519"}}],"payload":{"lines":"3505,3519"}},{"content":"\n<p data-lines=\"3519,3520\">Objective-C and SWIFT Target</p>","children":[{"content":"Discuss specific objective-c and swift exploitation strategies","children":[],"payload":{"lines":"3521,3523"}}],"payload":{"lines":"3519,3523"}},{"content":"\n<p data-lines=\"3523,3524\">ARM Pointer Authentication</p>","children":[{"content":"Exploitation despite modern mitigations","children":[],"payload":{"lines":"3525,3527"}}],"payload":{"lines":"3523,3527"}},{"content":"\n<p data-lines=\"3527,3528\">iOS Userland Debugging</p>","children":[{"content":"\n<p data-lines=\"3529,3530\">Using the iOS Userland Debugger for vulnerability research</p>","children":[],"payload":{"lines":"3529,3531"}},{"content":"\n<p data-lines=\"3531,3532\">How to deal with iOS Anti Debugging Tricks</p>","children":[],"payload":{"lines":"3531,3533"}}],"payload":{"lines":"3527,3533"}},{"content":"\n<p data-lines=\"3533,3534\">iOS Userland Heap</p>","children":[{"content":"\n<p data-lines=\"3535,3536\">Discussion of the iOS Userland Heap implementation</p>","children":[],"payload":{"lines":"3535,3537"}},{"content":"\n<p data-lines=\"3537,3538\">Discussion of other heap implementations in our targets</p>","children":[],"payload":{"lines":"3537,3539"}},{"content":"\n<p data-lines=\"3539,3540\">Introduction of new iOS userland heap visualization toolset</p>","children":[],"payload":{"lines":"3539,3541"}}],"payload":{"lines":"3533,3541"}},{"content":"\n<p data-lines=\"3541,3542\">MIG and other forms of IPC</p>","children":[{"content":"\n<p data-lines=\"3543,3544\">Introduction to MIG/IPC</p>","children":[],"payload":{"lines":"3543,3545"}},{"content":"\n<p data-lines=\"3545,3546\">Understanding the MIG/IPC architecture and its attach surface</p>","children":[],"payload":{"lines":"3545,3547"}},{"content":"\n<p data-lines=\"3547,3548\">Mach messages</p>","children":[],"payload":{"lines":"3547,3549"}},{"content":"\n<p data-lines=\"3549,3550\">Fuzzing and Exploitation of MIG services</p>","children":[],"payload":{"lines":"3549,3551"}}],"payload":{"lines":"3541,3551"}},{"content":"\n<p data-lines=\"3551,3552\">XPC services</p>","children":[{"content":"\n<p data-lines=\"3553,3554\">Introduction to XPC services</p>","children":[],"payload":{"lines":"3553,3555"}},{"content":"\n<p data-lines=\"3555,3556\">Understanding the XPC architecture and attack surface</p>","children":[],"payload":{"lines":"3555,3557"}},{"content":"\n<p data-lines=\"3557,3558\">Understanding target specific mitigations</p>","children":[],"payload":{"lines":"3557,3559"}},{"content":"\n<p data-lines=\"3559,3560\">XPC serialization / deserialization</p>","children":[],"payload":{"lines":"3559,3561"}},{"content":"\n<p data-lines=\"3561,3562\">Fuzzing XPC services</p>","children":[],"payload":{"lines":"3561,3563"}},{"content":"\n<p data-lines=\"3563,3564\">Exploiting XPC services</p>","children":[],"payload":{"lines":"3563,3565"}}],"payload":{"lines":"3551,3565"}},{"content":"\n<p data-lines=\"3565,3566\">Mobile Safari</p>","children":[{"content":"\n<p data-lines=\"3567,3568\">Introduction to Mobile Safari and its architecture</p>","children":[],"payload":{"lines":"3567,3569"}},{"content":"\n<p data-lines=\"3569,3570\">Understanding the attack surface of WebKit and JavaScript Core</p>","children":[],"payload":{"lines":"3569,3571"}},{"content":"\n<p data-lines=\"3571,3572\">Understanding target specific mitigations</p>","children":[],"payload":{"lines":"3571,3573"}},{"content":"\n<p data-lines=\"3573,3574\">Understanding the heap implementation</p>","children":[],"payload":{"lines":"3573,3575"}},{"content":"\n<p data-lines=\"3575,3576\">Introspection and instrumentation</p>","children":[],"payload":{"lines":"3575,3577"}},{"content":"\n<p data-lines=\"3577,3578\">Fuzzing Mobile Safari</p>","children":[],"payload":{"lines":"3577,3579"}},{"content":"\n<p data-lines=\"3579,3580\">Exploiting Mobile Safari</p>","children":[],"payload":{"lines":"3579,3581"}}],"payload":{"lines":"3565,3581"}},{"content":"\n<p data-lines=\"3581,3582\">iMessage Exploitation</p>","children":[{"content":"\n<p data-lines=\"3583,3584\">Introduction to iMessage and its architecture</p>","children":[],"payload":{"lines":"3583,3585"}},{"content":"\n<p data-lines=\"3585,3586\">Understanding the attack surface</p>","children":[],"payload":{"lines":"3585,3587"}},{"content":"\n<p data-lines=\"3587,3588\">Understanding target specific mitigations</p>","children":[],"payload":{"lines":"3587,3589"}},{"content":"\n<p data-lines=\"3589,3590\">Introspection and instrumentation</p>","children":[],"payload":{"lines":"3589,3591"}},{"content":"\n<p data-lines=\"3591,3592\">Fuzzing iMessage</p>","children":[],"payload":{"lines":"3591,3593"}},{"content":"\n<p data-lines=\"3593,3594\">Exploiting iMessage</p>","children":[],"payload":{"lines":"3593,3595"}}],"payload":{"lines":"3581,3595"}}],"payload":{"lines":"3503,3595"}},{"content":"\n<p data-lines=\"3595,3596\">Android</p>","children":[{"content":"\n<p data-lines=\"3597,3598\">Introduction</p>","children":[],"payload":{"lines":"3597,3599"}},{"content":"\n<p data-lines=\"3599,3600\">Subtopic 2</p>","children":[],"payload":{"lines":"3599,3601"}},{"content":"\n<p data-lines=\"3601,3602\">Subtopic 3</p>","children":[],"payload":{"lines":"3601,3603"}},{"content":"\n<p data-lines=\"3603,3604\">Subtopic 4</p>","children":[],"payload":{"lines":"3603,3605"}},{"content":"\n<p data-lines=\"3605,3606\">Subtopic 5</p>","children":[],"payload":{"lines":"3605,3607"}}],"payload":{"lines":"3595,3607"}}],"payload":{"lines":"3501,3607"}},{"content":"\n<p data-lines=\"3607,3608\">Native API</p>","children":[],"payload":{"lines":"3607,3609"}},{"content":"\n<p data-lines=\"3609,3610\">Scheduled Task/Job</p>","children":[],"payload":{"lines":"3609,3611"}}],"payload":{"lines":"3495,3611"}},{"content":"\n<p data-lines=\"3611,3612\">Persistence</p>","children":[{"content":"\n<p data-lines=\"3613,3614\">Boot or Logon Initialization Scripts</p>","children":[],"payload":{"lines":"3613,3615"}},{"content":"\n<p data-lines=\"3615,3616\">Compromise Application Executable</p>","children":[],"payload":{"lines":"3615,3617"}},{"content":"\n<p data-lines=\"3617,3618\">Compromise Client Software Binary</p>","children":[],"payload":{"lines":"3617,3619"}},{"content":"\n<p data-lines=\"3619,3620\">Event Triggered Execution</p>","children":[{"content":"Broadcast Receivers","children":[],"payload":{"lines":"3621,3623"}}],"payload":{"lines":"3619,3623"}},{"content":"\n<p data-lines=\"3623,3624\">Foreground Persistence</p>","children":[],"payload":{"lines":"3623,3625"}},{"content":"\n<p data-lines=\"3625,3626\">Hijack Execution Flow</p>","children":[{"content":"System Runtime API Hijacking","children":[],"payload":{"lines":"3627,3629"}}],"payload":{"lines":"3625,3629"}},{"content":"\n<p data-lines=\"3629,3630\">Scheduled Task/Job</p>","children":[],"payload":{"lines":"3629,3631"}}],"payload":{"lines":"3611,3631"}},{"content":"\n<p data-lines=\"3631,3632\">Privilege Escalation</p>","children":[{"content":"\n<p data-lines=\"3633,3634\">Abuse Elevation Control Mechanism</p>","children":[{"content":"Device Administrator Permissions","children":[],"payload":{"lines":"3635,3637"}}],"payload":{"lines":"3633,3637"}},{"content":"\n<p data-lines=\"3637,3638\">Exploitation for Privilege Escalation</p>","children":[{"content":"\n<p data-lines=\"3639,3640\">iOS</p>","children":[{"content":"\n<p data-lines=\"3641,3642\">Introduction</p>","children":[{"content":"\n<p data-lines=\"3643,3644\">How to set up your Mac and Device for Vuln Research/Exploit Development</p>","children":[],"payload":{"lines":"3643,3645"}},{"content":"\n<p data-lines=\"3645,3646\">How to write Code for your iDevice</p>","children":[],"payload":{"lines":"3645,3647"}}],"payload":{"lines":"3641,3647"}},{"content":"\n<p data-lines=\"3647,3648\">Low Level ARM / ARM64</p>","children":[{"content":"\n<p data-lines=\"3649,3650\">Differences between ARM and ARM64</p>","children":[],"payload":{"lines":"3649,3651"}},{"content":"\n<p data-lines=\"3651,3652\">Exception Handling</p>","children":[],"payload":{"lines":"3651,3653"}},{"content":"\n<p data-lines=\"3653,3654\">Hardware Page Tables</p>","children":[],"payload":{"lines":"3653,3655"}},{"content":"\n<p data-lines=\"3655,3656\">Special Registers used by iOS</p>","children":[],"payload":{"lines":"3655,3657"}},{"content":"\n<p data-lines=\"3657,3658\">PAN and PAC (Pointer Authentication)</p>","children":[],"payload":{"lines":"3657,3659"}}],"payload":{"lines":"3647,3659"}},{"content":"\n<p data-lines=\"3659,3660\">iOS Kernel Source Code</p>","children":[{"content":"\n<p data-lines=\"3661,3662\">Structure of the Kernel Source Code</p>","children":[],"payload":{"lines":"3661,3663"}},{"content":"\n<p data-lines=\"3663,3664\">Where to look for Vulnerabilities</p>","children":[],"payload":{"lines":"3663,3665"}},{"content":"\n<p data-lines=\"3665,3666\">Implementation of Mitigations</p>","children":[],"payload":{"lines":"3665,3667"}},{"content":"\n<p data-lines=\"3667,3668\">MAC Policy Hooks, Sandbox, Entitlements, Code Signing</p>","children":[],"payload":{"lines":"3667,3669"}}],"payload":{"lines":"3659,3669"}},{"content":"\n<p data-lines=\"3669,3670\">iOS Kernel Reversing</p>","children":[{"content":"\n<p data-lines=\"3671,3672\">Structure of the Kernel Binary</p>","children":[],"payload":{"lines":"3671,3673"}},{"content":"\n<p data-lines=\"3673,3674\">Finding Important Structures</p>","children":[],"payload":{"lines":"3673,3675"}},{"content":"\n<p data-lines=\"3675,3676\">Porting Symbols</p>","children":[],"payload":{"lines":"3675,3677"}},{"content":"\n<p data-lines=\"3677,3678\">Closed Source Kernel Parts and How to analyze them</p>","children":[],"payload":{"lines":"3677,3679"}}],"payload":{"lines":"3669,3679"}},{"content":"\n<p data-lines=\"3679,3680\">iOS Kernel Heap</p>","children":[{"content":"\n<p data-lines=\"3681,3682\">In-Depth Explanation of How the Kernel Heap works (concentration on the new heap)</p>","children":[],"payload":{"lines":"3681,3683"}},{"content":"\n<p data-lines=\"3683,3684\">Discussion of Kernel Heap Separation and Anti Heap Feng Shui Mitigations</p>","children":[],"payload":{"lines":"3683,3685"}},{"content":"\n<p data-lines=\"3685,3686\">Discuss remaining weaknesses in current implementation</p>","children":[],"payload":{"lines":"3685,3687"}}],"payload":{"lines":"3679,3687"}},{"content":"\n<p data-lines=\"3687,3688\">iOS Kernel Exploit Mitigations</p>","children":[{"content":"\n<p data-lines=\"3689,3690\">Discussion of all the iOS Kernel Exploit Mitigations introduced</p>","children":[],"payload":{"lines":"3689,3691"}},{"content":"\n<p data-lines=\"3691,3692\">Includes software and hardware based mitigations like (KTRR, KPP, PPL, PAC, PAN, APRR)</p>","children":[],"payload":{"lines":"3691,3693"}},{"content":"\n<p data-lines=\"3693,3694\">Including newest mitigations already known in latest kernels</p>","children":[],"payload":{"lines":"3693,3695"}},{"content":"\n<p data-lines=\"3695,3696\">Discussion of various weaknesses in these protections</p>","children":[],"payload":{"lines":"3695,3697"}}],"payload":{"lines":"3687,3697"}},{"content":"\n<p data-lines=\"3697,3698\">iOS Kernel Vulnerabilities and their Exploitation</p>","children":[{"content":"Concentration of recent vulnerabilities and how they can be exploited with current set of mitigations","children":[],"payload":{"lines":"3699,3701"}}],"payload":{"lines":"3697,3701"}},{"content":"\n<p data-lines=\"3701,3702\">iOS Kernel Jailbreaking</p>","children":[{"content":"Discussion of recent challenges for jailbreaking","children":[],"payload":{"lines":"3703,3705"}}],"payload":{"lines":"3701,3705"}}],"payload":{"lines":"3639,3705"}},{"content":"\n<p data-lines=\"3705,3706\">Android</p>","children":[{"content":"\n<p data-lines=\"3707,3708\">Subtopic 1</p>","children":[],"payload":{"lines":"3707,3709"}},{"content":"\n<p data-lines=\"3709,3710\">Subtopic 2</p>","children":[],"payload":{"lines":"3709,3711"}},{"content":"\n<p data-lines=\"3711,3712\">Subtopic 3</p>","children":[],"payload":{"lines":"3711,3713"}},{"content":"\n<p data-lines=\"3713,3714\">Subtopic 4</p>","children":[],"payload":{"lines":"3713,3715"}},{"content":"\n<p data-lines=\"3715,3716\">Subtopic 5</p>","children":[],"payload":{"lines":"3715,3717"}},{"content":"\n<p data-lines=\"3717,3718\">Subtopic 6</p>","children":[],"payload":{"lines":"3717,3719"}}],"payload":{"lines":"3705,3719"}}],"payload":{"lines":"3637,3719"}},{"content":"\n<p data-lines=\"3719,3720\">Process Injection</p>","children":[{"content":"Ptrace System Calls","children":[],"payload":{"lines":"3721,3723"}}],"payload":{"lines":"3719,3723"}}],"payload":{"lines":"3631,3723"}},{"content":"\n<p data-lines=\"3723,3724\">Defense Evasion</p>","children":[{"content":"\n<p data-lines=\"3725,3726\">Application Versioning</p>","children":[],"payload":{"lines":"3725,3727"}},{"content":"\n<p data-lines=\"3727,3728\">Download New Code at Runtime</p>","children":[],"payload":{"lines":"3727,3729"}},{"content":"\n<p data-lines=\"3729,3730\">Execution Guardrails</p>","children":[{"content":"Geofencing","children":[],"payload":{"lines":"3731,3733"}}],"payload":{"lines":"3729,3733"}},{"content":"\n<p data-lines=\"3733,3734\">Foreground Persistence</p>","children":[],"payload":{"lines":"3733,3735"}},{"content":"\n<p data-lines=\"3735,3736\">Hide Artifacts</p>","children":[{"content":"\n<p data-lines=\"3737,3738\">Suppress Application Icon</p>","children":[],"payload":{"lines":"3737,3739"}},{"content":"\n<p data-lines=\"3739,3740\">User Evasion</p>","children":[],"payload":{"lines":"3739,3741"}}],"payload":{"lines":"3735,3741"}},{"content":"\n<p data-lines=\"3741,3742\">Hooking</p>","children":[],"payload":{"lines":"3741,3743"}},{"content":"\n<p data-lines=\"3743,3744\">Impair Defenses</p>","children":[{"content":"\n<p data-lines=\"3745,3746\">Prevent Application Removal</p>","children":[],"payload":{"lines":"3745,3747"}},{"content":"\n<p data-lines=\"3747,3748\">Device Lockout</p>","children":[],"payload":{"lines":"3747,3749"}},{"content":"\n<p data-lines=\"3749,3750\">Disable or Modify Tools</p>","children":[],"payload":{"lines":"3749,3751"}}],"payload":{"lines":"3743,3751"}},{"content":"\n<p data-lines=\"3751,3752\">Indicator Removal on Host</p>","children":[{"content":"\n<p data-lines=\"3753,3754\">Uninstall Malicious Application</p>","children":[],"payload":{"lines":"3753,3755"}},{"content":"\n<p data-lines=\"3755,3756\">File Deletion</p>","children":[],"payload":{"lines":"3755,3757"}},{"content":"\n<p data-lines=\"3757,3758\">Disguise Root/Jailbreak Indicators</p>","children":[],"payload":{"lines":"3757,3759"}}],"payload":{"lines":"3751,3759"}},{"content":"\n<p data-lines=\"3759,3760\">Input Injection</p>","children":[],"payload":{"lines":"3759,3761"}},{"content":"\n<p data-lines=\"3761,3762\">Masquerading</p>","children":[{"content":"Match Legitimate Name or Location","children":[],"payload":{"lines":"3763,3765"}}],"payload":{"lines":"3761,3765"}},{"content":"\n<p data-lines=\"3765,3766\">Native API</p>","children":[],"payload":{"lines":"3765,3767"}},{"content":"\n<p data-lines=\"3767,3768\">Obfuscated Files or Information</p>","children":[{"content":"\n<p data-lines=\"3769,3770\">Steganography</p>","children":[],"payload":{"lines":"3769,3771"}},{"content":"\n<p data-lines=\"3771,3772\">Software Packing</p>","children":[],"payload":{"lines":"3771,3773"}}],"payload":{"lines":"3767,3773"}},{"content":"\n<p data-lines=\"3773,3774\">Process Injection</p>","children":[{"content":"Ptrace System Calls","children":[],"payload":{"lines":"3775,3777"}}],"payload":{"lines":"3773,3777"}},{"content":"\n<p data-lines=\"3777,3778\">Proxy Through Victim</p>","children":[],"payload":{"lines":"3777,3779"}},{"content":"\n<p data-lines=\"3779,3780\">Subvert Trust Controls</p>","children":[{"content":"Code Signing Policy Modification","children":[],"payload":{"lines":"3781,3783"}}],"payload":{"lines":"3779,3783"}},{"content":"\n<p data-lines=\"3783,3784\">Virtualization/Sandbox Evasion</p>","children":[{"content":"System Checks","children":[],"payload":{"lines":"3785,3787"}}],"payload":{"lines":"3783,3787"}}],"payload":{"lines":"3723,3787"}},{"content":"\n<p data-lines=\"3787,3788\">Credential Access</p>","children":[{"content":"\n<p data-lines=\"3789,3790\">Access Notifications</p>","children":[],"payload":{"lines":"3789,3791"}},{"content":"\n<p data-lines=\"3791,3792\">Clipboard Data</p>","children":[],"payload":{"lines":"3791,3793"}},{"content":"\n<p data-lines=\"3793,3794\">Credentials from Password Store</p>","children":[{"content":"Keychain","children":[],"payload":{"lines":"3795,3797"}}],"payload":{"lines":"3793,3797"}},{"content":"\n<p data-lines=\"3797,3798\">Input Capture</p>","children":[{"content":"\n<p data-lines=\"3799,3800\">Keylogging</p>","children":[],"payload":{"lines":"3799,3801"}},{"content":"\n<p data-lines=\"3801,3802\">GUI Input Capture</p>","children":[],"payload":{"lines":"3801,3803"}}],"payload":{"lines":"3797,3803"}},{"content":"\n<p data-lines=\"3803,3804\">Steal Application Access Token</p>","children":[{"content":"URI Hijacking","children":[],"payload":{"lines":"3805,3807"}}],"payload":{"lines":"3803,3807"}}],"payload":{"lines":"3787,3807"}},{"content":"\n<p data-lines=\"3807,3808\">Discovery</p>","children":[{"content":"\n<p data-lines=\"3809,3810\">File and Directory Discovery</p>","children":[],"payload":{"lines":"3809,3811"}},{"content":"\n<p data-lines=\"3811,3812\">Location Tracking</p>","children":[{"content":"\n<p data-lines=\"3813,3814\">Remote Device Management Services</p>","children":[],"payload":{"lines":"3813,3815"}},{"content":"\n<p data-lines=\"3815,3816\">Impersonate SS7 Nodes</p>","children":[],"payload":{"lines":"3815,3817"}}],"payload":{"lines":"3811,3817"}},{"content":"\n<p data-lines=\"3817,3818\">Network Service Scanning</p>","children":[],"payload":{"lines":"3817,3819"}},{"content":"\n<p data-lines=\"3819,3820\">Process Discovery</p>","children":[],"payload":{"lines":"3819,3821"}},{"content":"\n<p data-lines=\"3821,3822\">Software Discovery</p>","children":[{"content":"Security Software Discovery","children":[],"payload":{"lines":"3823,3825"}}],"payload":{"lines":"3821,3825"}},{"content":"\n<p data-lines=\"3825,3826\">System Information Discovery</p>","children":[],"payload":{"lines":"3825,3827"}},{"content":"\n<p data-lines=\"3827,3828\">System Network Configuration Discovery</p>","children":[],"payload":{"lines":"3827,3829"}},{"content":"\n<p data-lines=\"3829,3830\">System Network Connections Discovery</p>","children":[],"payload":{"lines":"3829,3831"}}],"payload":{"lines":"3807,3831"}},{"content":"\n<p data-lines=\"3831,3832\">Lateral Movement</p>","children":[{"content":"\n<p data-lines=\"3833,3834\">Exploitation of Remote Services</p>","children":[],"payload":{"lines":"3833,3835"}},{"content":"\n<p data-lines=\"3835,3836\">Replication Through Removable Media</p>","children":[],"payload":{"lines":"3835,3837"}}],"payload":{"lines":"3831,3837"}},{"content":"\n<p data-lines=\"3837,3838\">Collection</p>","children":[{"content":"\n<p data-lines=\"3839,3840\">Access Notifications</p>","children":[],"payload":{"lines":"3839,3841"}},{"content":"\n<p data-lines=\"3841,3842\">Adversary-in-the-Middle</p>","children":[],"payload":{"lines":"3841,3843"}},{"content":"\n<p data-lines=\"3843,3844\">Archive Collected Data</p>","children":[],"payload":{"lines":"3843,3845"}},{"content":"\n<p data-lines=\"3845,3846\">Audio Capture</p>","children":[],"payload":{"lines":"3845,3847"}},{"content":"\n<p data-lines=\"3847,3848\">Call Control</p>","children":[],"payload":{"lines":"3847,3849"}},{"content":"\n<p data-lines=\"3849,3850\">Clipboard Data</p>","children":[],"payload":{"lines":"3849,3851"}},{"content":"\n<p data-lines=\"3851,3852\">Data from Local System</p>","children":[],"payload":{"lines":"3851,3853"}},{"content":"\n<p data-lines=\"3853,3854\">Input Capture</p>","children":[{"content":"\n<p data-lines=\"3855,3856\">Keylogging</p>","children":[],"payload":{"lines":"3855,3857"}},{"content":"\n<p data-lines=\"3857,3858\">GUI Input Capture</p>","children":[],"payload":{"lines":"3857,3859"}}],"payload":{"lines":"3853,3859"}},{"content":"\n<p data-lines=\"3859,3860\">Location Tracking</p>","children":[{"content":"\n<p data-lines=\"3861,3862\">Remote Device Management Services</p>","children":[],"payload":{"lines":"3861,3863"}},{"content":"\n<p data-lines=\"3863,3864\">Impersonate SS7 Nodes</p>","children":[],"payload":{"lines":"3863,3865"}}],"payload":{"lines":"3859,3865"}},{"content":"\n<p data-lines=\"3865,3866\">Protected User Data</p>","children":[{"content":"\n<p data-lines=\"3867,3868\">Calendar Entries</p>","children":[],"payload":{"lines":"3867,3869"}},{"content":"\n<p data-lines=\"3869,3870\">Call Log</p>","children":[],"payload":{"lines":"3869,3871"}},{"content":"\n<p data-lines=\"3871,3872\">Contact List</p>","children":[],"payload":{"lines":"3871,3873"}},{"content":"\n<p data-lines=\"3873,3874\">SMS Messages</p>","children":[],"payload":{"lines":"3873,3875"}}],"payload":{"lines":"3865,3875"}},{"content":"\n<p data-lines=\"3875,3876\">Screen Capture</p>","children":[],"payload":{"lines":"3875,3877"}},{"content":"\n<p data-lines=\"3877,3878\">Stored Application Data</p>","children":[],"payload":{"lines":"3877,3879"}},{"content":"\n<p data-lines=\"3879,3880\">Video Capture</p>","children":[],"payload":{"lines":"3879,3881"}}],"payload":{"lines":"3837,3881"}},{"content":"\n<p data-lines=\"3881,3882\">Command and Control</p>","children":[{"content":"\n<p data-lines=\"3883,3884\">Application Layer Protocol</p>","children":[{"content":"Web Protocols","children":[],"payload":{"lines":"3885,3887"}}],"payload":{"lines":"3883,3887"}},{"content":"\n<p data-lines=\"3887,3888\">Call Control</p>","children":[],"payload":{"lines":"3887,3889"}},{"content":"\n<p data-lines=\"3889,3890\">Dynamic Resolution</p>","children":[{"content":"Domain Generation Algorithms","children":[],"payload":{"lines":"3891,3893"}}],"payload":{"lines":"3889,3893"}},{"content":"\n<p data-lines=\"3893,3894\">Encrypted Channel</p>","children":[{"content":"\n<p data-lines=\"3895,3896\">Symmetric Cryptography</p>","children":[],"payload":{"lines":"3895,3897"}},{"content":"\n<p data-lines=\"3897,3898\">Asymmetric Cryptography</p>","children":[],"payload":{"lines":"3897,3899"}}],"payload":{"lines":"3893,3899"}},{"content":"\n<p data-lines=\"3899,3900\">Ingress Tool Transfer</p>","children":[],"payload":{"lines":"3899,3901"}},{"content":"\n<p data-lines=\"3901,3902\">Non-Standard Port</p>","children":[],"payload":{"lines":"3901,3903"}},{"content":"\n<p data-lines=\"3903,3904\">Out of Band Data</p>","children":[],"payload":{"lines":"3903,3905"}},{"content":"\n<p data-lines=\"3905,3906\">Remote Access Software</p>","children":[],"payload":{"lines":"3905,3907"}},{"content":"\n<p data-lines=\"3907,3908\">Web Service</p>","children":[{"content":"\n<p data-lines=\"3909,3910\">Dead Drop Resolver</p>","children":[],"payload":{"lines":"3909,3911"}},{"content":"\n<p data-lines=\"3911,3912\">Bidirectional Communication</p>","children":[],"payload":{"lines":"3911,3913"}},{"content":"\n<p data-lines=\"3913,3914\">One-Way Communication</p>","children":[],"payload":{"lines":"3913,3915"}}],"payload":{"lines":"3907,3915"}}],"payload":{"lines":"3881,3915"}},{"content":"\n<p data-lines=\"3915,3916\">Exfiltration</p>","children":[{"content":"\n<p data-lines=\"3917,3918\">Exfiltration Over Alternative Protocol</p>","children":[{"content":"Exfiltration Over Unencrypted Non-C2 Protocol","children":[],"payload":{"lines":"3919,3921"}}],"payload":{"lines":"3917,3921"}},{"content":"\n<p data-lines=\"3921,3922\">Exfiltration Over C2 Channel</p>","children":[],"payload":{"lines":"3921,3923"}}],"payload":{"lines":"3915,3923"}},{"content":"\n<p data-lines=\"3923,3924\">Impact</p>","children":[{"content":"\n<p data-lines=\"3925,3926\">Account Access Removal</p>","children":[],"payload":{"lines":"3925,3927"}},{"content":"\n<p data-lines=\"3927,3928\">Call Control</p>","children":[],"payload":{"lines":"3927,3929"}},{"content":"\n<p data-lines=\"3929,3930\">Data Destruction</p>","children":[],"payload":{"lines":"3929,3931"}},{"content":"\n<p data-lines=\"3931,3932\">Data Encrypted for Impact</p>","children":[],"payload":{"lines":"3931,3933"}},{"content":"\n<p data-lines=\"3933,3934\">Data Manipulation</p>","children":[{"content":"Transmitted Data Manipulation","children":[],"payload":{"lines":"3935,3937"}}],"payload":{"lines":"3933,3937"}},{"content":"\n<p data-lines=\"3937,3938\">Endpoint Denial of Service</p>","children":[],"payload":{"lines":"3937,3939"}},{"content":"\n<p data-lines=\"3939,3940\">Generate Traffic from Victim</p>","children":[],"payload":{"lines":"3939,3941"}},{"content":"\n<p data-lines=\"3941,3942\">Input Injection</p>","children":[],"payload":{"lines":"3941,3943"}},{"content":"\n<p data-lines=\"3943,3944\">Network Denial of Service</p>","children":[],"payload":{"lines":"3943,3945"}},{"content":"\n<p data-lines=\"3945,3946\">SMS Control</p>","children":[],"payload":{"lines":"3945,3947"}}],"payload":{"lines":"3923,3947"}}],"payload":{"lines":"3473,3947"}}],"payload":{"lines":"3455,3947"}}],"payload":{"lines":"2565,2566"}},{"content":"ICS Security","children":[{"content":"\n<p data-lines=\"3949,3950\">Penetration Testing</p>","children":[{"content":"\n<p data-lines=\"3951,3952\">Prerequisites</p>","children":[{"content":"\n<p data-lines=\"3953,3954\">Basics of Network</p>","children":[],"payload":{"lines":"3953,3955"}},{"content":"\n<p data-lines=\"3955,3956\">Basics of Linux</p>","children":[],"payload":{"lines":"3955,3957"}},{"content":"\n<p data-lines=\"3957,3958\">Basics of HTML and CSS</p>","children":[],"payload":{"lines":"3957,3959"}},{"content":"\n<p data-lines=\"3959,3960\">Basics of JSON and XML</p>","children":[],"payload":{"lines":"3959,3961"}},{"content":"\n<p data-lines=\"3961,3962\">Basics of Powershell</p>","children":[],"payload":{"lines":"3961,3963"}},{"content":"\n<p data-lines=\"3963,3964\">Basics of C/C++</p>","children":[],"payload":{"lines":"3963,3965"}},{"content":"\n<p data-lines=\"3965,3966\">Professional Python</p>","children":[],"payload":{"lines":"3965,3967"}}],"payload":{"lines":"3951,3967"}},{"content":"\n<p data-lines=\"3967,3968\">Syllabus</p>","children":[{"content":"\n<p data-lines=\"3969,3970\">Exploit Controllers</p>","children":[{"content":"\n<p data-lines=\"3971,3972\">Control System Architectures</p>","children":[],"payload":{"lines":"3971,3973"}},{"content":"\n<p data-lines=\"3973,3974\">PLCs, RTUs, and IEDs</p>","children":[],"payload":{"lines":"3973,3975"}},{"content":"\n<p data-lines=\"3975,3976\">Understanding RTOS</p>","children":[],"payload":{"lines":"3975,3977"}},{"content":"\n<p data-lines=\"3977,3978\">Industrial and Non-Industrial</p>","children":[],"payload":{"lines":"3977,3979"}},{"content":"\n<p data-lines=\"3979,3980\">Industrial Internet of Things</p>","children":[],"payload":{"lines":"3979,3981"}},{"content":"\n<p data-lines=\"3981,3982\">Field Devices, Buses, and Loops</p>","children":[],"payload":{"lines":"3981,3983"}},{"content":"\n<p data-lines=\"3983,3984\">DCS vs SCADA</p>","children":[],"payload":{"lines":"3983,3985"}}],"payload":{"lines":"3969,3985"}},{"content":"\n<p data-lines=\"3985,3986\">Controller Logic</p>","children":[{"content":"\n<p data-lines=\"3987,3988\">Velocio PLCs vs Other PLCs</p>","children":[],"payload":{"lines":"3987,3989"}},{"content":"\n<p data-lines=\"3989,3990\">Creating Controller Logic</p>","children":[],"payload":{"lines":"3989,3991"}},{"content":"\n<p data-lines=\"3991,3992\">Programming a PLC</p>","children":[],"payload":{"lines":"3991,3993"}},{"content":"\n<p data-lines=\"3993,3994\">Creating an HMI</p>","children":[],"payload":{"lines":"3993,3995"}}],"payload":{"lines":"3985,3995"}},{"content":"\n<p data-lines=\"3995,3996\">Architecture Major ICS</p>","children":[{"content":"\n<p data-lines=\"3997,3998\">Supervisory Control and Data Acquisition</p>","children":[],"payload":{"lines":"3997,3999"}},{"content":"\n<p data-lines=\"3999,4000\">Distribution Grid Management and Substation Automation</p>","children":[],"payload":{"lines":"3999,4001"}},{"content":"\n<p data-lines=\"4001,4002\">Wide Area Management, Protection, and Control (WAMPAC)</p>","children":[],"payload":{"lines":"4001,4003"}},{"content":"\n<p data-lines=\"4003,4004\">Demand Response (DR)</p>","children":[],"payload":{"lines":"4003,4005"}},{"content":"\n<p data-lines=\"4005,4006\">Distributed Energy Resources (DER)</p>","children":[],"payload":{"lines":"4005,4007"}},{"content":"\n<p data-lines=\"4007,4008\">Advanced Metering Infrastructure (AMI)</p>","children":[],"payload":{"lines":"4007,4009"}},{"content":"\n<p data-lines=\"4009,4010\">Electric Vehicles (EV)</p>","children":[],"payload":{"lines":"4009,4011"}}],"payload":{"lines":"3995,4011"}},{"content":"\n<p data-lines=\"4011,4012\">NESCOR Methodology</p>","children":[{"content":"\n<p data-lines=\"4013,4014\">Architecture Reviews</p>","children":[],"payload":{"lines":"4013,4015"}},{"content":"\n<p data-lines=\"4015,4016\">Testing the Master Servers</p>","children":[],"payload":{"lines":"4015,4017"}},{"content":"\n<p data-lines=\"4017,4018\">Testing the User Interfaces</p>","children":[],"payload":{"lines":"4017,4019"}},{"content":"\n<p data-lines=\"4019,4020\">Testing the Network Communications</p>","children":[],"payload":{"lines":"4019,4021"}},{"content":"\n<p data-lines=\"4021,4022\">Testing the Embedded Field Devices</p>","children":[],"payload":{"lines":"4021,4023"}},{"content":"\n<p data-lines=\"4023,4024\">End-to-End Assessment</p>","children":[],"payload":{"lines":"4023,4025"}}],"payload":{"lines":"4011,4025"}},{"content":"\n<p data-lines=\"4025,4026\">ICS User Interfaces</p>","children":[{"content":"\n<p data-lines=\"4027,4028\">Traditional Applications</p>","children":[],"payload":{"lines":"4027,4029"}},{"content":"\n<p data-lines=\"4029,4030\">Web Applications</p>","children":[],"payload":{"lines":"4029,4031"}},{"content":"\n<p data-lines=\"4031,4032\">Terminal Interfaces</p>","children":[],"payload":{"lines":"4031,4033"}}],"payload":{"lines":"4025,4033"}},{"content":"\n<p data-lines=\"4033,4034\">ICS Field and Floor Devices</p>","children":[{"content":"\n<p data-lines=\"4035,4036\">Functional Analysis</p>","children":[],"payload":{"lines":"4035,4037"}},{"content":"\n<p data-lines=\"4037,4038\">USB Communications to Tech Interfaces</p>","children":[],"payload":{"lines":"4037,4039"}},{"content":"\n<p data-lines=\"4039,4040\">Endpoints in Field Tech Interface</p>","children":[],"payload":{"lines":"4039,4041"}}],"payload":{"lines":"4033,4041"}},{"content":"\n<p data-lines=\"4041,4042\">ICS Communication Protocols</p>","children":[{"content":"\n<p data-lines=\"4043,4044\">Traditional Network Penetration Testing</p>","children":[],"payload":{"lines":"4043,4045"}},{"content":"\n<p data-lines=\"4045,4046\">Vulnerability Scanning</p>","children":[],"payload":{"lines":"4045,4047"}}],"payload":{"lines":"4041,4047"}},{"content":"\n<p data-lines=\"4047,4048\">Serial Communications</p>","children":[{"content":"\n<p data-lines=\"4049,4050\">RS-232, TIA-422, and TIA-485</p>","children":[],"payload":{"lines":"4049,4051"}},{"content":"\n<p data-lines=\"4051,4052\">Fieldbus Protocols and Protocol Families</p>","children":[],"payload":{"lines":"4051,4053"}},{"content":"\n<p data-lines=\"4053,4054\">Sniffing and Injection of Serial Modbus RTU</p>","children":[],"payload":{"lines":"4053,4055"}}],"payload":{"lines":"4047,4055"}},{"content":"\n<p data-lines=\"4055,4056\">TCP/IP Based ICS Protocols</p>","children":[{"content":"\n<p data-lines=\"4057,4058\">Protocol Capture and Analysis</p>","children":[],"payload":{"lines":"4057,4059"}},{"content":"\n<p data-lines=\"4059,4060\">ModbusTCP, ProfiNet, EnternetIP/CIP, DNP3, IEC 104, IEC 61850, ICCP</p>","children":[],"payload":{"lines":"4059,4061"}},{"content":"\n<p data-lines=\"4061,4062\">Dealing with Unknown Protocols</p>","children":[],"payload":{"lines":"4061,4063"}},{"content":"\n<p data-lines=\"4063,4064\">Entropy Analysis of Network Payloads</p>","children":[],"payload":{"lines":"4063,4065"}},{"content":"\n<p data-lines=\"4065,4066\">Protocol Fuzzing</p>","children":[],"payload":{"lines":"4065,4067"}}],"payload":{"lines":"4055,4067"}},{"content":"\n<p data-lines=\"4067,4068\">Capturing RF Signals</p>","children":[{"content":"\n<p data-lines=\"4069,4070\">RF is used in ICS and IIoT</p>","children":[],"payload":{"lines":"4069,4071"}},{"content":"\n<p data-lines=\"4071,4072\">Hardware used for different RF protocols</p>","children":[],"payload":{"lines":"4071,4073"}},{"content":"\n<p data-lines=\"4073,4074\">SDR vs rfcat</p>","children":[],"payload":{"lines":"4073,4075"}},{"content":"\n<p data-lines=\"4075,4076\">Comparison of different SDR hardware</p>","children":[],"payload":{"lines":"4075,4077"}},{"content":"\n<p data-lines=\"4077,4078\">Finding the Right Frequencies</p>","children":[],"payload":{"lines":"4077,4079"}},{"content":"\n<p data-lines=\"4079,4080\">Right Antenna</p>","children":[],"payload":{"lines":"4079,4081"}},{"content":"\n<p data-lines=\"4081,4082\">RF Spectrum Analysis</p>","children":[],"payload":{"lines":"4081,4083"}},{"content":"\n<p data-lines=\"4083,4084\">RF Signal Capture</p>","children":[],"payload":{"lines":"4083,4085"}}],"payload":{"lines":"4067,4085"}},{"content":"\n<p data-lines=\"4085,4086\">Analyzing the Captured Signal</p>","children":[{"content":"\n<p data-lines=\"4087,4088\">Spread Spectrum Types</p>","children":[],"payload":{"lines":"4087,4089"}},{"content":"\n<p data-lines=\"4089,4090\">Recovering Frequency Hopping</p>","children":[],"payload":{"lines":"4089,4091"}},{"content":"\n<p data-lines=\"4091,4092\">Modulation and Demodulation</p>","children":[],"payload":{"lines":"4091,4093"}},{"content":"\n<p data-lines=\"4093,4094\">identifying modulation type</p>","children":[],"payload":{"lines":"4093,4095"}},{"content":"\n<p data-lines=\"4095,4096\">Traffic Demodulation with Universal Radio Hacker</p>","children":[],"payload":{"lines":"4095,4097"}},{"content":"\n<p data-lines=\"4097,4098\">Signal Demodulation with GNU Radio</p>","children":[],"payload":{"lines":"4097,4099"}}],"payload":{"lines":"4085,4099"}},{"content":"\n<p data-lines=\"4099,4100\">RF Transmission</p>","children":[{"content":"\n<p data-lines=\"4101,4102\">Traffic Transmission and Exploitation</p>","children":[],"payload":{"lines":"4101,4103"}},{"content":"\n<p data-lines=\"4103,4104\">Hardware Needed for Transmission</p>","children":[],"payload":{"lines":"4103,4105"}},{"content":"\n<p data-lines=\"4105,4106\">Replaying Attacks</p>","children":[],"payload":{"lines":"4105,4107"}},{"content":"\n<p data-lines=\"4107,4108\">Signal Transmission with URH</p>","children":[],"payload":{"lines":"4107,4109"}},{"content":"\n<p data-lines=\"4109,4110\">Signal Generation with rfcat and Great Scott Gadgets' Yardstick</p>","children":[],"payload":{"lines":"4109,4111"}}],"payload":{"lines":"4099,4111"}},{"content":"\n<p data-lines=\"4111,4112\">ICS Embedded Electronics</p>","children":[{"content":"\n<p data-lines=\"4113,4114\">Embedded Device Circuits</p>","children":[],"payload":{"lines":"4113,4115"}},{"content":"\n<p data-lines=\"4115,4116\">Local Attack through Physically Exposed Devices</p>","children":[],"payload":{"lines":"4115,4117"}},{"content":"\n<p data-lines=\"4117,4118\">Expanding Physical Attacks to Remote Attacks</p>","children":[],"payload":{"lines":"4117,4119"}},{"content":"\n<p data-lines=\"4119,4120\">Cryptographic Keys and Firmware</p>","children":[],"payload":{"lines":"4119,4121"}}],"payload":{"lines":"4111,4121"}},{"content":"\n<p data-lines=\"4121,4122\">Embedded Electronics in ICS</p>","children":[{"content":"\n<p data-lines=\"4123,4124\">Discussion of Device Disassembly</p>","children":[],"payload":{"lines":"4123,4125"}},{"content":"\n<p data-lines=\"4125,4126\">Component Analysis on Embedded Circuits</p>","children":[],"payload":{"lines":"4125,4127"}},{"content":"\n<p data-lines=\"4127,4128\">Acquisition and Analysis for Target Components</p>","children":[],"payload":{"lines":"4127,4129"}}],"payload":{"lines":"4121,4129"}},{"content":"\n<p data-lines=\"4129,4130\">Field and Floor Device Firmware</p>","children":[{"content":"\n<p data-lines=\"4131,4132\">Disassembling Firmware</p>","children":[],"payload":{"lines":"4131,4133"}},{"content":"\n<p data-lines=\"4133,4134\">Analyzing Disassembled Firmware</p>","children":[],"payload":{"lines":"4133,4135"}},{"content":"\n<p data-lines=\"4135,4136\">Exploiting Firmware Flaws</p>","children":[],"payload":{"lines":"4135,4137"}}],"payload":{"lines":"4129,4137"}},{"content":"\n<p data-lines=\"4137,4138\">Bus Snooping</p>","children":[{"content":"\n<p data-lines=\"4139,4140\">Snooping Busses</p>","children":[],"payload":{"lines":"4139,4141"}},{"content":"\n<p data-lines=\"4141,4142\">Analyzing data with Data Dumping</p>","children":[],"payload":{"lines":"4141,4143"}},{"content":"\n<p data-lines=\"4143,4144\">String Analysis of Datasets</p>","children":[],"payload":{"lines":"4143,4145"}},{"content":"\n<p data-lines=\"4145,4146\">Entropy Analysis of Datasets</p>","children":[],"payload":{"lines":"4145,4147"}},{"content":"\n<p data-lines=\"4147,4148\">Systematic Key Searches through Datasets</p>","children":[],"payload":{"lines":"4147,4149"}},{"content":"\n<p data-lines=\"4149,4150\">File Carving from Datasets</p>","children":[],"payload":{"lines":"4149,4151"}}],"payload":{"lines":"4137,4151"}},{"content":"\n<p data-lines=\"4151,4152\">SPI Serial Protocol</p>","children":[{"content":"\n<p data-lines=\"4153,4154\">Dumping SPI EEPROMs</p>","children":[],"payload":{"lines":"4153,4155"}},{"content":"\n<p data-lines=\"4155,4156\">Overview of JTAG</p>","children":[],"payload":{"lines":"4155,4157"}},{"content":"\n<p data-lines=\"4157,4158\">Interfacing with Debug Interfaces</p>","children":[],"payload":{"lines":"4157,4159"}},{"content":"\n<p data-lines=\"4159,4160\">Bus Snooping on Embedded Circuits</p>","children":[],"payload":{"lines":"4159,4161"}}],"payload":{"lines":"4151,4161"}},{"content":"\n<p data-lines=\"4161,4162\">Rest on Embedded Circuits</p>","children":[{"content":"\n<p data-lines=\"4163,4164\">Bus Pirate and Similar Tools</p>","children":[],"payload":{"lines":"4163,4165"}},{"content":"\n<p data-lines=\"4165,4166\">I2C or Two-Wire Serial Protocol</p>","children":[],"payload":{"lines":"4165,4167"}},{"content":"\n<p data-lines=\"4167,4168\">Dumping I2C EEPROMs</p>","children":[],"payload":{"lines":"4167,4169"}}],"payload":{"lines":"4161,4169"}}],"payload":{"lines":"3967,4169"}}],"payload":{"lines":"3949,4169"}},{"content":"\n<p data-lines=\"4169,4170\">Red Team</p>","children":[{"content":"\n<p data-lines=\"4171,4172\">Prerequisites</p>","children":[{"content":"\n<p data-lines=\"4173,4174\">Basics of Network</p>","children":[],"payload":{"lines":"4173,4175"}},{"content":"\n<p data-lines=\"4175,4176\">Basics of Linux</p>","children":[],"payload":{"lines":"4175,4177"}},{"content":"\n<p data-lines=\"4177,4178\">Basics of Powershell</p>","children":[],"payload":{"lines":"4177,4179"}},{"content":"\n<p data-lines=\"4179,4180\">Basics of C/C++</p>","children":[],"payload":{"lines":"4179,4181"}},{"content":"\n<p data-lines=\"4181,4182\">Professional Python</p>","children":[],"payload":{"lines":"4181,4183"}}],"payload":{"lines":"4171,4183"}},{"content":"\n<p data-lines=\"4183,4184\">Syllabus</p>","children":[{"content":"\n<p data-lines=\"4185,4186\">Introduction</p>","children":[{"content":"\n<p data-lines=\"4187,4188\">Linux System</p>","children":[{"content":"\n<p data-lines=\"4189,4190\">Linux Kernel</p>","children":[],"payload":{"lines":"4189,4191"}},{"content":"\n<p data-lines=\"4191,4192\">Basic I/O Operations</p>","children":[],"payload":{"lines":"4191,4193"}},{"content":"\n<p data-lines=\"4193,4194\">Advanced I/O interfaces</p>","children":[],"payload":{"lines":"4193,4195"}},{"content":"\n<p data-lines=\"4195,4196\">System Calls for Process Management</p>","children":[],"payload":{"lines":"4195,4197"}},{"content":"\n<p data-lines=\"4197,4198\">Advanced Process Management</p>","children":[],"payload":{"lines":"4197,4199"}},{"content":"\n<p data-lines=\"4199,4200\">Multithreaded Programming</p>","children":[],"payload":{"lines":"4199,4201"}},{"content":"\n<p data-lines=\"4201,4202\">File and Directory Management</p>","children":[],"payload":{"lines":"4201,4203"}},{"content":"\n<p data-lines=\"4203,4204\">Interfaces for Allocating Memory</p>","children":[],"payload":{"lines":"4203,4205"}},{"content":"\n<p data-lines=\"4205,4206\">Basic and Advanced Signal Interfaces</p>","children":[],"payload":{"lines":"4205,4207"}},{"content":"\n<p data-lines=\"4207,4208\">Clock Management</p>","children":[],"payload":{"lines":"4207,4209"}}],"payload":{"lines":"4187,4209"}},{"content":"\n<p data-lines=\"4209,4210\">Windows Internals</p>","children":[{"content":"\n<p data-lines=\"4211,4212\">System Architecture</p>","children":[],"payload":{"lines":"4211,4213"}},{"content":"\n<p data-lines=\"4213,4214\">Process and Jobs</p>","children":[],"payload":{"lines":"4213,4215"}},{"content":"\n<p data-lines=\"4215,4216\">Threads</p>","children":[],"payload":{"lines":"4215,4217"}},{"content":"\n<p data-lines=\"4217,4218\">Kernel Mechanisms</p>","children":[],"payload":{"lines":"4217,4219"}},{"content":"\n<p data-lines=\"4219,4220\">Memory Management</p>","children":[],"payload":{"lines":"4219,4221"}},{"content":"\n<p data-lines=\"4221,4222\">I/O System</p>","children":[],"payload":{"lines":"4221,4223"}},{"content":"\n<p data-lines=\"4223,4224\">Security</p>","children":[],"payload":{"lines":"4223,4225"}}],"payload":{"lines":"4209,4225"}},{"content":"\n<p data-lines=\"4225,4226\">x86/x64 Assembly</p>","children":[{"content":"\n<p data-lines=\"4227,4228\">CPU Registers</p>","children":[],"payload":{"lines":"4227,4229"}},{"content":"\n<p data-lines=\"4229,4230\">SUB Registers</p>","children":[],"payload":{"lines":"4229,4231"}},{"content":"\n<p data-lines=\"4231,4232\">MOV Instruction</p>","children":[],"payload":{"lines":"4231,4233"}},{"content":"\n<p data-lines=\"4233,4234\">ADD and SUB Instructions</p>","children":[],"payload":{"lines":"4233,4235"}},{"content":"\n<p data-lines=\"4235,4236\">INC and DEC Instructions</p>","children":[],"payload":{"lines":"4235,4237"}},{"content":"\n<p data-lines=\"4237,4238\">MUL and DIV Instructions</p>","children":[],"payload":{"lines":"4237,4239"}},{"content":"\n<p data-lines=\"4239,4240\">PUSH and POP Instructions</p>","children":[],"payload":{"lines":"4239,4241"}},{"content":"\n<p data-lines=\"4241,4242\">CMP and JMP Instructions</p>","children":[],"payload":{"lines":"4241,4243"}},{"content":"\n<p data-lines=\"4243,4244\">CALL and RET Instructions</p>","children":[],"payload":{"lines":"4243,4245"}},{"content":"\n<p data-lines=\"4245,4246\">Avoiding Null Bytes</p>","children":[],"payload":{"lines":"4245,4247"}},{"content":"\n<p data-lines=\"4247,4248\">Function Calls</p>","children":[],"payload":{"lines":"4247,4249"}},{"content":"\n<p data-lines=\"4249,4250\">Input and Output Functions</p>","children":[],"payload":{"lines":"4249,4251"}},{"content":"\n<p data-lines=\"4251,4252\">Code Caves</p>","children":[],"payload":{"lines":"4251,4253"}},{"content":"\n<p data-lines=\"4253,4254\">Structured Programming</p>","children":[],"payload":{"lines":"4253,4255"}},{"content":"\n<p data-lines=\"4255,4256\">Bitwise Operations</p>","children":[],"payload":{"lines":"4255,4257"}},{"content":"\n<p data-lines=\"4257,4258\">Signed Operations</p>","children":[],"payload":{"lines":"4257,4259"}},{"content":"\n<p data-lines=\"4259,4260\">Memory Arrays</p>","children":[],"payload":{"lines":"4259,4261"}}],"payload":{"lines":"4225,4261"}}],"payload":{"lines":"4185,4261"}},{"content":"\n<p data-lines=\"4261,4262\">Initial Access</p>","children":[{"content":"\n<p data-lines=\"4263,4264\">Drive-by Compromise</p>","children":[],"payload":{"lines":"4263,4265"}},{"content":"\n<p data-lines=\"4265,4266\">Exploit Public-Facing Application</p>","children":[],"payload":{"lines":"4265,4267"}},{"content":"\n<p data-lines=\"4267,4268\">Exploitation of Remote Services</p>","children":[],"payload":{"lines":"4267,4269"}},{"content":"\n<p data-lines=\"4269,4270\">External Remote Services</p>","children":[],"payload":{"lines":"4269,4271"}},{"content":"\n<p data-lines=\"4271,4272\">Internet Accessible Device</p>","children":[],"payload":{"lines":"4271,4273"}},{"content":"\n<p data-lines=\"4273,4274\">Remote Services</p>","children":[],"payload":{"lines":"4273,4275"}},{"content":"\n<p data-lines=\"4275,4276\">Replication Through Removable Media</p>","children":[],"payload":{"lines":"4275,4277"}},{"content":"\n<p data-lines=\"4277,4278\">Rogue Master</p>","children":[],"payload":{"lines":"4277,4279"}},{"content":"\n<p data-lines=\"4279,4280\">Spearphishing Attachment</p>","children":[],"payload":{"lines":"4279,4281"}},{"content":"\n<p data-lines=\"4281,4282\">Supply Chain Compromise</p>","children":[],"payload":{"lines":"4281,4283"}},{"content":"\n<p data-lines=\"4283,4284\">Transient Cyber Asset</p>","children":[],"payload":{"lines":"4283,4285"}},{"content":"\n<p data-lines=\"4285,4286\">Wireless Compromise</p>","children":[],"payload":{"lines":"4285,4287"}}],"payload":{"lines":"4261,4287"}},{"content":"\n<p data-lines=\"4287,4288\">Execution</p>","children":[{"content":"\n<p data-lines=\"4289,4290\">Change Operating Mode</p>","children":[],"payload":{"lines":"4289,4291"}},{"content":"\n<p data-lines=\"4291,4292\">Command-Line Interface</p>","children":[],"payload":{"lines":"4291,4293"}},{"content":"\n<p data-lines=\"4293,4294\">Execution through API</p>","children":[],"payload":{"lines":"4293,4295"}},{"content":"\n<p data-lines=\"4295,4296\">Graphical User Interface</p>","children":[],"payload":{"lines":"4295,4297"}},{"content":"\n<p data-lines=\"4297,4298\">Hooking</p>","children":[],"payload":{"lines":"4297,4299"}},{"content":"\n<p data-lines=\"4299,4300\">Modify Controller Tasking</p>","children":[],"payload":{"lines":"4299,4301"}},{"content":"\n<p data-lines=\"4301,4302\">Native API</p>","children":[],"payload":{"lines":"4301,4303"}},{"content":"\n<p data-lines=\"4303,4304\">Scripting</p>","children":[],"payload":{"lines":"4303,4305"}},{"content":"\n<p data-lines=\"4305,4306\">User Execution</p>","children":[],"payload":{"lines":"4305,4307"}}],"payload":{"lines":"4287,4307"}},{"content":"\n<p data-lines=\"4307,4308\">Persistence</p>","children":[{"content":"\n<p data-lines=\"4309,4310\">Hardcoded Credentials</p>","children":[],"payload":{"lines":"4309,4311"}},{"content":"\n<p data-lines=\"4311,4312\">Modify Program</p>","children":[],"payload":{"lines":"4311,4313"}},{"content":"\n<p data-lines=\"4313,4314\">Module Firmware</p>","children":[],"payload":{"lines":"4313,4315"}},{"content":"\n<p data-lines=\"4315,4316\">Project File Infection</p>","children":[],"payload":{"lines":"4315,4317"}},{"content":"\n<p data-lines=\"4317,4318\">System Firmware</p>","children":[],"payload":{"lines":"4317,4319"}},{"content":"\n<p data-lines=\"4319,4320\">Valid Accounts</p>","children":[],"payload":{"lines":"4319,4321"}}],"payload":{"lines":"4307,4321"}},{"content":"\n<p data-lines=\"4321,4322\">Privilege Escalation</p>","children":[{"content":"\n<p data-lines=\"4323,4324\">Exploitation for Privilege Escalation</p>","children":[],"payload":{"lines":"4323,4325"}},{"content":"\n<p data-lines=\"4325,4326\">Hooking</p>","children":[],"payload":{"lines":"4325,4327"}}],"payload":{"lines":"4321,4327"}},{"content":"\n<p data-lines=\"4327,4328\">Evasion</p>","children":[{"content":"\n<p data-lines=\"4329,4330\">Change Operating Mode</p>","children":[],"payload":{"lines":"4329,4331"}},{"content":"\n<p data-lines=\"4331,4332\">Exploitation for Evasion</p>","children":[],"payload":{"lines":"4331,4333"}},{"content":"\n<p data-lines=\"4333,4334\">Indicator Removal on Host</p>","children":[],"payload":{"lines":"4333,4335"}},{"content":"\n<p data-lines=\"4335,4336\">Masquerading</p>","children":[],"payload":{"lines":"4335,4337"}},{"content":"\n<p data-lines=\"4337,4338\">Rootkit</p>","children":[],"payload":{"lines":"4337,4339"}},{"content":"\n<p data-lines=\"4339,4340\">Spoof Reporting Message</p>","children":[],"payload":{"lines":"4339,4341"}}],"payload":{"lines":"4327,4341"}},{"content":"\n<p data-lines=\"4341,4342\">Discovery</p>","children":[{"content":"\n<p data-lines=\"4343,4344\">Network Connection Enumeration</p>","children":[],"payload":{"lines":"4343,4345"}},{"content":"\n<p data-lines=\"4345,4346\">Network Sniffing</p>","children":[],"payload":{"lines":"4345,4347"}},{"content":"\n<p data-lines=\"4347,4348\">Remote System Discovery</p>","children":[],"payload":{"lines":"4347,4349"}},{"content":"\n<p data-lines=\"4349,4350\">Remote System Information Discovery</p>","children":[],"payload":{"lines":"4349,4351"}},{"content":"\n<p data-lines=\"4351,4352\">Wireless Sniffing</p>","children":[],"payload":{"lines":"4351,4353"}}],"payload":{"lines":"4341,4353"}},{"content":"\n<p data-lines=\"4353,4354\">Lateral Movement</p>","children":[{"content":"\n<p data-lines=\"4355,4356\">Default Credentials</p>","children":[],"payload":{"lines":"4355,4357"}},{"content":"\n<p data-lines=\"4357,4358\">Exploitation of Remote Services</p>","children":[],"payload":{"lines":"4357,4359"}},{"content":"\n<p data-lines=\"4359,4360\">Hardcoded Credentials</p>","children":[],"payload":{"lines":"4359,4361"}},{"content":"\n<p data-lines=\"4361,4362\">Lateral Tool Transfer</p>","children":[],"payload":{"lines":"4361,4363"}},{"content":"\n<p data-lines=\"4363,4364\">Program Download</p>","children":[],"payload":{"lines":"4363,4365"}},{"content":"\n<p data-lines=\"4365,4366\">Remote Services</p>","children":[],"payload":{"lines":"4365,4367"}},{"content":"\n<p data-lines=\"4367,4368\">Valid Accounts</p>","children":[],"payload":{"lines":"4367,4369"}}],"payload":{"lines":"4353,4369"}},{"content":"\n<p data-lines=\"4369,4370\">Collection</p>","children":[{"content":"\n<p data-lines=\"4371,4372\">Adversary-in-the-Middle</p>","children":[],"payload":{"lines":"4371,4373"}},{"content":"\n<p data-lines=\"4373,4374\">Automated Collection</p>","children":[],"payload":{"lines":"4373,4375"}},{"content":"\n<p data-lines=\"4375,4376\">Data from Information Repositories</p>","children":[],"payload":{"lines":"4375,4377"}},{"content":"\n<p data-lines=\"4377,4378\">Data from Local System</p>","children":[],"payload":{"lines":"4377,4379"}},{"content":"\n<p data-lines=\"4379,4380\">Detect Operating Mode</p>","children":[],"payload":{"lines":"4379,4381"}},{"content":"\n<p data-lines=\"4381,4382\">I/O Image</p>","children":[],"payload":{"lines":"4381,4383"}},{"content":"\n<p data-lines=\"4383,4384\">Monitor Process State</p>","children":[],"payload":{"lines":"4383,4385"}},{"content":"\n<p data-lines=\"4385,4386\">Point & Tag Identification</p>","children":[],"payload":{"lines":"4385,4387"}},{"content":"\n<p data-lines=\"4387,4388\">Program Upload</p>","children":[],"payload":{"lines":"4387,4389"}},{"content":"\n<p data-lines=\"4389,4390\">Screen Capture</p>","children":[],"payload":{"lines":"4389,4391"}},{"content":"\n<p data-lines=\"4391,4392\">Wireless Sniffing</p>","children":[],"payload":{"lines":"4391,4393"}}],"payload":{"lines":"4369,4393"}},{"content":"\n<p data-lines=\"4393,4394\">Command and Control</p>","children":[{"content":"\n<p data-lines=\"4395,4396\">Commonly Used Port</p>","children":[],"payload":{"lines":"4395,4397"}},{"content":"\n<p data-lines=\"4397,4398\">Connection Proxy</p>","children":[],"payload":{"lines":"4397,4399"}},{"content":"\n<p data-lines=\"4399,4400\">Standard Application Layer Protocol</p>","children":[],"payload":{"lines":"4399,4401"}}],"payload":{"lines":"4393,4401"}},{"content":"\n<p data-lines=\"4401,4402\">Inhibit Response Function</p>","children":[{"content":"\n<p data-lines=\"4403,4404\">Activate Firmware Update Mode</p>","children":[],"payload":{"lines":"4403,4405"}},{"content":"\n<p data-lines=\"4405,4406\">Alarm Suppression</p>","children":[],"payload":{"lines":"4405,4407"}},{"content":"\n<p data-lines=\"4407,4408\">Block Command Message</p>","children":[],"payload":{"lines":"4407,4409"}},{"content":"\n<p data-lines=\"4409,4410\">Block Reporting Message</p>","children":[],"payload":{"lines":"4409,4411"}},{"content":"\n<p data-lines=\"4411,4412\">Block Serial COM</p>","children":[],"payload":{"lines":"4411,4413"}},{"content":"\n<p data-lines=\"4413,4414\">Change Credential</p>","children":[],"payload":{"lines":"4413,4415"}},{"content":"\n<p data-lines=\"4415,4416\">Data Destruction</p>","children":[],"payload":{"lines":"4415,4417"}},{"content":"\n<p data-lines=\"4417,4418\">Denial of Service</p>","children":[],"payload":{"lines":"4417,4419"}},{"content":"\n<p data-lines=\"4419,4420\">Device Restart/Shutdown</p>","children":[],"payload":{"lines":"4419,4421"}},{"content":"\n<p data-lines=\"4421,4422\">Manipulate I/O Image</p>","children":[],"payload":{"lines":"4421,4423"}},{"content":"\n<p data-lines=\"4423,4424\">Modify Alarm Settings</p>","children":[],"payload":{"lines":"4423,4425"}},{"content":"\n<p data-lines=\"4425,4426\">Rootkit</p>","children":[],"payload":{"lines":"4425,4427"}},{"content":"\n<p data-lines=\"4427,4428\">Service Stop</p>","children":[],"payload":{"lines":"4427,4429"}},{"content":"\n<p data-lines=\"4429,4430\">System Firmware</p>","children":[],"payload":{"lines":"4429,4431"}}],"payload":{"lines":"4401,4431"}},{"content":"\n<p data-lines=\"4431,4432\">Impair Process Control</p>","children":[{"content":"\n<p data-lines=\"4433,4434\">Brute Force I/O</p>","children":[],"payload":{"lines":"4433,4435"}},{"content":"\n<p data-lines=\"4435,4436\">Modify Parameter</p>","children":[],"payload":{"lines":"4435,4437"}},{"content":"\n<p data-lines=\"4437,4438\">Module Firmware</p>","children":[],"payload":{"lines":"4437,4439"}},{"content":"\n<p data-lines=\"4439,4440\">Spoof Reporting Message</p>","children":[],"payload":{"lines":"4439,4441"}},{"content":"\n<p data-lines=\"4441,4442\">Unauthorized Command Message</p>","children":[],"payload":{"lines":"4441,4443"}}],"payload":{"lines":"4431,4443"}},{"content":"\n<p data-lines=\"4443,4444\">Impact</p>","children":[{"content":"\n<p data-lines=\"4445,4446\">Damage to Property</p>","children":[],"payload":{"lines":"4445,4447"}},{"content":"\n<p data-lines=\"4447,4448\">Denial of Control</p>","children":[],"payload":{"lines":"4447,4449"}},{"content":"\n<p data-lines=\"4449,4450\">Denial of View</p>","children":[],"payload":{"lines":"4449,4451"}},{"content":"\n<p data-lines=\"4451,4452\">Loss of Availability</p>","children":[],"payload":{"lines":"4451,4453"}},{"content":"\n<p data-lines=\"4453,4454\">Loss of Control</p>","children":[],"payload":{"lines":"4453,4455"}},{"content":"\n<p data-lines=\"4455,4456\">Loss of Productivity and Revenue</p>","children":[],"payload":{"lines":"4455,4457"}},{"content":"\n<p data-lines=\"4457,4458\">Loss of Protection</p>","children":[],"payload":{"lines":"4457,4459"}},{"content":"\n<p data-lines=\"4459,4460\">Loss of Safety</p>","children":[],"payload":{"lines":"4459,4461"}},{"content":"\n<p data-lines=\"4461,4462\">Loss of View</p>","children":[],"payload":{"lines":"4461,4463"}},{"content":"\n<p data-lines=\"4463,4464\">Manipulation of Control</p>","children":[],"payload":{"lines":"4463,4465"}},{"content":"\n<p data-lines=\"4465,4466\">Manipulation of View</p>","children":[],"payload":{"lines":"4465,4467"}},{"content":"\n<p data-lines=\"4467,4468\">Theft of Operational Information</p>","children":[],"payload":{"lines":"4467,4469"}}],"payload":{"lines":"4443,4469"}}],"payload":{"lines":"4183,4469"}}],"payload":{"lines":"4169,4469"}},{"content":"\n<p data-lines=\"4469,4470\">Digital Forensic</p>","children":[{"content":"\n<p data-lines=\"4471,4472\">Prerequisites</p>","children":[{"content":"\n<p data-lines=\"4473,4474\">Basics of Network</p>","children":[],"payload":{"lines":"4473,4475"}},{"content":"\n<p data-lines=\"4475,4476\">Basics of Linux</p>","children":[],"payload":{"lines":"4475,4477"}},{"content":"\n<p data-lines=\"4477,4478\">Basics of C-Sharp</p>","children":[],"payload":{"lines":"4477,4479"}},{"content":"\n<p data-lines=\"4479,4480\">Professional Python</p>","children":[],"payload":{"lines":"4479,4481"}},{"content":"\n<p data-lines=\"4481,4482\">Professional Powershell</p>","children":[],"payload":{"lines":"4481,4483"}}],"payload":{"lines":"4471,4483"}},{"content":"\n<p data-lines=\"4483,4484\">Syllabus</p>","children":[{"content":"\n<p data-lines=\"4485,4486\">Local Process</p>","children":[{"content":"\n<p data-lines=\"4487,4488\">PLC Platform Application Tools</p>","children":[],"payload":{"lines":"4487,4489"}},{"content":"\n<p data-lines=\"4489,4490\">Programming a PLC</p>","children":[],"payload":{"lines":"4489,4491"}},{"content":"\n<p data-lines=\"4491,4492\">Service Discovery on PLC</p>","children":[],"payload":{"lines":"4491,4493"}},{"content":"\n<p data-lines=\"4493,4494\">HMI Platform Application Tools</p>","children":[],"payload":{"lines":"4493,4495"}},{"content":"\n<p data-lines=\"4495,4496\">HMI to PLC Communication</p>","children":[],"payload":{"lines":"4495,4497"}}],"payload":{"lines":"4485,4497"}},{"content":"\n<p data-lines=\"4497,4498\">System of Systems</p>","children":[{"content":"\n<p data-lines=\"4499,4500\">Peer-to-Peer Communications</p>","children":[],"payload":{"lines":"4499,4501"}},{"content":"\n<p data-lines=\"4501,4502\">SCADA Systems</p>","children":[],"payload":{"lines":"4501,4503"}},{"content":"\n<p data-lines=\"4503,4504\">OPC Communications</p>","children":[],"payload":{"lines":"4503,4505"}}],"payload":{"lines":"4497,4505"}},{"content":"\n<p data-lines=\"4505,4506\">ICS Network Infrastructure</p>","children":[{"content":"\n<p data-lines=\"4507,4508\">Network Architecture</p>","children":[],"payload":{"lines":"4507,4509"}},{"content":"\n<p data-lines=\"4509,4510\">ICS Firewalls</p>","children":[],"payload":{"lines":"4509,4511"}},{"content":"\n<p data-lines=\"4511,4512\">ICS Perimeter</p>","children":[],"payload":{"lines":"4511,4513"}},{"content":"\n<p data-lines=\"4513,4514\">Historians</p>","children":[],"payload":{"lines":"4513,4515"}},{"content":"\n<p data-lines=\"4515,4516\">Jump Host/2FA</p>","children":[],"payload":{"lines":"4515,4517"}}],"payload":{"lines":"4505,4517"}},{"content":"\n<p data-lines=\"4517,4518\">ICS System Management</p>","children":[{"content":"\n<p data-lines=\"4519,4520\">ICS System Monitoring and Logging</p>","children":[],"payload":{"lines":"4519,4521"}},{"content":"\n<p data-lines=\"4521,4522\">ICS Asset Management</p>","children":[],"payload":{"lines":"4521,4523"}},{"content":"\n<p data-lines=\"4523,4524\">ICS Asset Validation</p>","children":[],"payload":{"lines":"4523,4525"}}],"payload":{"lines":"4517,4525"}}],"payload":{"lines":"4483,4525"}}],"payload":{"lines":"4469,4525"}}],"payload":{"lines":"3947,3948"}}],"payload":{"lines":"3,4"}},{"content":"Defensive Security","children":[{"content":"Digital Forensic","children":[{"content":"\n<p data-lines=\"4529,4530\">Reverse Engineering</p>","children":[{"content":"\n<p data-lines=\"4531,4532\">Prerequisites</p>","children":[{"content":"\n<p data-lines=\"4533,4534\">Basics of Network</p>","children":[],"payload":{"lines":"4533,4535"}},{"content":"\n<p data-lines=\"4535,4536\">Basics of Linux</p>","children":[],"payload":{"lines":"4535,4537"}},{"content":"\n<p data-lines=\"4537,4538\">Professional C/C++</p>","children":[],"payload":{"lines":"4537,4539"}},{"content":"\n<p data-lines=\"4539,4540\">Professional x86/x64 Assembly</p>","children":[],"payload":{"lines":"4539,4541"}}],"payload":{"lines":"4531,4541"}},{"content":"\n<p data-lines=\"4541,4542\">Syllabus</p>","children":[{"content":"\n<p data-lines=\"4543,4544\">Introduction</p>","children":[{"content":"\n<p data-lines=\"4545,4546\">Working with Assembly Instructions</p>","children":[],"payload":{"lines":"4545,4547"}},{"content":"\n<p data-lines=\"4547,4548\">Understanding Function Calls</p>","children":[],"payload":{"lines":"4547,4549"}},{"content":"\n<p data-lines=\"4549,4550\">Recognizing Arguments</p>","children":[],"payload":{"lines":"4549,4551"}}],"payload":{"lines":"4543,4551"}},{"content":"\n<p data-lines=\"4551,4552\">C-language \"Hello World\"</p>","children":[{"content":"\n<p data-lines=\"4553,4554\">Getting familiar with IDA and Using the Software to Navigate Inside Assembly Code</p>","children":[],"payload":{"lines":"4553,4555"}},{"content":"\n<p data-lines=\"4555,4556\">Applying Theory Learnt in the Previous Track</p>","children":[],"payload":{"lines":"4555,4557"}}],"payload":{"lines":"4551,4557"}},{"content":"\n<p data-lines=\"4557,4558\">Simple Lambdas</p>","children":[{"content":"\n<p data-lines=\"4559,4560\">Reconstructing Custom Structures Transmitting the Arguments</p>","children":[],"payload":{"lines":"4559,4561"}},{"content":"\n<p data-lines=\"4561,4562\">Understanding Value and Pointer Fields in Such Structures</p>","children":[],"payload":{"lines":"4561,4563"}},{"content":"\n<p data-lines=\"4563,4564\">C-like Memory Management</p>","children":[],"payload":{"lines":"4563,4565"}}],"payload":{"lines":"4557,4565"}},{"content":"\n<p data-lines=\"4565,4566\">Stuck in The Heap</p>","children":[{"content":"\n<p data-lines=\"4567,4568\">Creating Massive Custom Structures on Stack and Heap</p>","children":[],"payload":{"lines":"4567,4569"}},{"content":"\n<p data-lines=\"4569,4570\">Analyzing Them in Resulting Executable Binary File to See The Difference in These Memory Types</p>","children":[],"payload":{"lines":"4569,4571"}},{"content":"\n<p data-lines=\"4571,4572\">Reversing the Code with Static Variables, Understand Their Position in Executables</p>","children":[],"payload":{"lines":"4571,4573"}}],"payload":{"lines":"4565,4573"}},{"content":"\n<p data-lines=\"4573,4574\">Lists and Tricky Pointers</p>","children":[{"content":"\n<p data-lines=\"4575,4576\">How Custom C List Looks on a Binary Level</p>","children":[],"payload":{"lines":"4575,4577"}},{"content":"\n<p data-lines=\"4577,4578\">How to Handle Lists with Pointers That Point to The Middle of Next Element</p>","children":[],"payload":{"lines":"4577,4579"}},{"content":"\n<p data-lines=\"4579,4580\">Understanding Custom Data Types, Which You Would Met in Binaries, Further</p>","children":[],"payload":{"lines":"4579,4581"}}],"payload":{"lines":"4573,4581"}},{"content":"\n<p data-lines=\"4581,4582\">C++ and OOP</p>","children":[{"content":"How to Reverse-Engineer Programs Written in C++","children":[],"payload":{"lines":"4583,4585"}}],"payload":{"lines":"4581,4585"}},{"content":"\n<p data-lines=\"4585,4586\">Pain In The Containers</p>","children":[{"content":"\n<p data-lines=\"4587,4588\">How C++ STL Containers Look Like in Executables</p>","children":[],"payload":{"lines":"4587,4589"}},{"content":"\n<p data-lines=\"4589,4590\">How to Analyze Them in Compiled Programs, Creating Proper Structures</p>","children":[],"payload":{"lines":"4589,4591"}},{"content":"\n<p data-lines=\"4591,4592\">Upon Which Basement std::map, std::set are Build</p>","children":[],"payload":{"lines":"4591,4593"}}],"payload":{"lines":"4585,4593"}},{"content":"\n<p data-lines=\"4593,4594\">Golang Reverse Engineering</p>","children":[{"content":"\n<p data-lines=\"4595,4596\">The Basics of The Go</p>","children":[],"payload":{"lines":"4595,4597"}},{"content":"\n<p data-lines=\"4597,4598\">How to Approach Reverse Engineering When Faced with Binaries Generated by its Compiler</p>","children":[],"payload":{"lines":"4597,4599"}}],"payload":{"lines":"4593,4599"}},{"content":"\n<p data-lines=\"4599,4600\">Rust Code</p>","children":[{"content":"\n<p data-lines=\"4601,4602\">Understanding Non-Stripped Rust Code</p>","children":[],"payload":{"lines":"4601,4603"}},{"content":"\n<p data-lines=\"4603,4604\">Dividing Runtime and Custom Rust Code</p>","children":[],"payload":{"lines":"4603,4605"}},{"content":"\n<p data-lines=\"4605,4606\">Demangling Rust Function Names</p>","children":[],"payload":{"lines":"4605,4607"}}],"payload":{"lines":"4599,4607"}},{"content":"\n<p data-lines=\"4607,4608\">Anti-Debugger</p>","children":[{"content":"\n<p data-lines=\"4609,4610\">Process Environment Block Structure (PEB)</p>","children":[],"payload":{"lines":"4609,4611"}},{"content":"\n<p data-lines=\"4611,4612\">Direct Windows API</p>","children":[],"payload":{"lines":"4611,4613"}},{"content":"\n<p data-lines=\"4613,4614\">Debugger Privilege (Process Access Token)</p>","children":[],"payload":{"lines":"4613,4615"}},{"content":"\n<p data-lines=\"4615,4616\">Debugger Detection Based on Parent Processes</p>","children":[],"payload":{"lines":"4615,4617"}},{"content":"\n<p data-lines=\"4617,4618\">Enumeration of Known Processes and Debugger Window Classes</p>","children":[],"payload":{"lines":"4617,4619"}},{"content":"\n<p data-lines=\"4619,4620\">Enumeration of Debugger Process Modules</p>","children":[],"payload":{"lines":"4619,4621"}},{"content":"\n<p data-lines=\"4621,4622\">Software and Hardware Breakpoints</p>","children":[],"payload":{"lines":"4621,4623"}},{"content":"\n<p data-lines=\"4623,4624\">Code Execution Time Based Detection</p>","children":[],"payload":{"lines":"4623,4625"}},{"content":"\n<p data-lines=\"4625,4626\">Structure Exception Handling (SEH)</p>","children":[],"payload":{"lines":"4625,4627"}},{"content":"\n<p data-lines=\"4627,4628\">Unhandled Exception Filter</p>","children":[],"payload":{"lines":"4627,4629"}}],"payload":{"lines":"4607,4629"}},{"content":"\n<p data-lines=\"4629,4630\">Anti-VM</p>","children":[{"content":"\n<p data-lines=\"4631,4632\">Hypervisor Brand by CPUID</p>","children":[],"payload":{"lines":"4631,4633"}},{"content":"\n<p data-lines=\"4633,4634\">Time Based Detection</p>","children":[],"payload":{"lines":"4633,4635"}},{"content":"\n<p data-lines=\"4635,4636\">Network Adapters and MAC Addresses</p>","children":[],"payload":{"lines":"4635,4637"}},{"content":"\n<p data-lines=\"4637,4638\">Enumeration of Known Processes and VMs Window Classes</p>","children":[],"payload":{"lines":"4637,4639"}},{"content":"\n<p data-lines=\"4639,4640\">VMs Driver Services and Registry Keys</p>","children":[],"payload":{"lines":"4639,4641"}},{"content":"\n<p data-lines=\"4641,4642\">Known Paths to VMs Files and Directories</p>","children":[],"payload":{"lines":"4641,4643"}},{"content":"\n<p data-lines=\"4643,4644\">User Activity Based Checks</p>","children":[],"payload":{"lines":"4643,4645"}}],"payload":{"lines":"4629,4645"}},{"content":"\n<p data-lines=\"4645,4646\">Anti-Analysis</p>","children":[{"content":"\n<p data-lines=\"4647,4648\">Protection of Strings and Sensitive Data</p>","children":[],"payload":{"lines":"4647,4649"}},{"content":"\n<p data-lines=\"4649,4650\">Inserting Bogus Control-Flow</p>","children":[],"payload":{"lines":"4649,4651"}},{"content":"\n<p data-lines=\"4651,4652\">Inserting Garbage Bytes</p>","children":[],"payload":{"lines":"4651,4653"}},{"content":"\n<p data-lines=\"4653,4654\">Junk Code Insertion</p>","children":[],"payload":{"lines":"4653,4655"}},{"content":"\n<p data-lines=\"4655,4656\">Control Flow Flattening</p>","children":[],"payload":{"lines":"4655,4657"}},{"content":"\n<p data-lines=\"4657,4658\">Opaque Predicates</p>","children":[],"payload":{"lines":"4657,4659"}},{"content":"\n<p data-lines=\"4659,4660\">Jumps Through Branch Functions</p>","children":[],"payload":{"lines":"4659,4661"}},{"content":"\n<p data-lines=\"4661,4662\">Indirect Jumps</p>","children":[],"payload":{"lines":"4661,4663"}},{"content":"\n<p data-lines=\"4663,4664\">Runtime Function Resolution</p>","children":[],"payload":{"lines":"4663,4665"}},{"content":"\n<p data-lines=\"4665,4666\">Dynamic Dispatch Obfuscation</p>","children":[],"payload":{"lines":"4665,4667"}},{"content":"\n<p data-lines=\"4667,4668\">Function Call Split Block</p>","children":[],"payload":{"lines":"4667,4669"}},{"content":"\n<p data-lines=\"4669,4670\">Executable Compressors</p>","children":[],"payload":{"lines":"4669,4671"}},{"content":"\n<p data-lines=\"4671,4672\">Self-Modifying Code (SMC)</p>","children":[],"payload":{"lines":"4671,4673"}}],"payload":{"lines":"4645,4673"}}],"payload":{"lines":"4541,4673"}}],"payload":{"lines":"4529,4673"}},{"content":"\n<p data-lines=\"4673,4674\">Malware Analysis</p>","children":[{"content":"\n<p data-lines=\"4675,4676\">Prerequisites</p>","children":[{"content":"\n<p data-lines=\"4677,4678\">Basics of Network</p>","children":[],"payload":{"lines":"4677,4679"}},{"content":"\n<p data-lines=\"4679,4680\">Basics of Linux</p>","children":[],"payload":{"lines":"4679,4681"}},{"content":"\n<p data-lines=\"4681,4682\">Basics of HTML and CSS</p>","children":[],"payload":{"lines":"4681,4683"}},{"content":"\n<p data-lines=\"4683,4684\">Basics of JavaScript</p>","children":[],"payload":{"lines":"4683,4685"}},{"content":"\n<p data-lines=\"4685,4686\">Basics of C-Sharp</p>","children":[],"payload":{"lines":"4685,4687"}},{"content":"\n<p data-lines=\"4687,4688\">Professional Python</p>","children":[],"payload":{"lines":"4687,4689"}},{"content":"\n<p data-lines=\"4689,4690\">Professional Java</p>","children":[],"payload":{"lines":"4689,4691"}},{"content":"\n<p data-lines=\"4691,4692\">Professional Powershell</p>","children":[],"payload":{"lines":"4691,4693"}},{"content":"\n<p data-lines=\"4693,4694\">Professional C/C++</p>","children":[],"payload":{"lines":"4693,4695"}},{"content":"\n<p data-lines=\"4695,4696\">Professional x86/x64 Assembly</p>","children":[],"payload":{"lines":"4695,4697"}}],"payload":{"lines":"4675,4697"}},{"content":"\n<p data-lines=\"4697,4698\">Syllabus</p>","children":[{"content":"\n<p data-lines=\"4699,4700\">Introduction</p>","children":[{"content":"\n<p data-lines=\"4701,4702\">Routine IDA Pro tasks</p>","children":[],"payload":{"lines":"4701,4703"}},{"content":"\n<p data-lines=\"4703,4704\">Advanced features of IDA Pro</p>","children":[],"payload":{"lines":"4703,4705"}},{"content":"\n<p data-lines=\"4705,4706\">Code and Data Flow Analysis</p>","children":[],"payload":{"lines":"4705,4707"}},{"content":"\n<p data-lines=\"4707,4708\">Stack Arithmetics</p>","children":[],"payload":{"lines":"4707,4709"}}],"payload":{"lines":"4699,4709"}},{"content":"\n<p data-lines=\"4709,4710\">Computer</p>","children":[{"content":"\n<p data-lines=\"4711,4712\">Windows Internals</p>","children":[{"content":"\n<p data-lines=\"4713,4714\">System Architecture</p>","children":[],"payload":{"lines":"4713,4715"}},{"content":"\n<p data-lines=\"4715,4716\">Process and Jobs</p>","children":[],"payload":{"lines":"4715,4717"}},{"content":"\n<p data-lines=\"4717,4718\">Threads</p>","children":[],"payload":{"lines":"4717,4719"}},{"content":"\n<p data-lines=\"4719,4720\">Kernel Mechanisms</p>","children":[],"payload":{"lines":"4719,4721"}},{"content":"\n<p data-lines=\"4721,4722\">Memory Management</p>","children":[],"payload":{"lines":"4721,4723"}},{"content":"\n<p data-lines=\"4723,4724\">I/O System</p>","children":[],"payload":{"lines":"4723,4725"}},{"content":"\n<p data-lines=\"4725,4726\">Security</p>","children":[],"payload":{"lines":"4725,4727"}}],"payload":{"lines":"4711,4727"}},{"content":"\n<p data-lines=\"4727,4728\">Linux System</p>","children":[{"content":"\n<p data-lines=\"4729,4730\">Linux Kernel</p>","children":[],"payload":{"lines":"4729,4731"}},{"content":"\n<p data-lines=\"4731,4732\">Basic I/O Operations</p>","children":[],"payload":{"lines":"4731,4733"}},{"content":"\n<p data-lines=\"4733,4734\">Advanced I/O interfaces</p>","children":[],"payload":{"lines":"4733,4735"}},{"content":"\n<p data-lines=\"4735,4736\">System Calls for Process Management</p>","children":[],"payload":{"lines":"4735,4737"}},{"content":"\n<p data-lines=\"4737,4738\">Advanced Process Management</p>","children":[],"payload":{"lines":"4737,4739"}},{"content":"\n<p data-lines=\"4739,4740\">Multithreaded Programming</p>","children":[],"payload":{"lines":"4739,4741"}},{"content":"\n<p data-lines=\"4741,4742\">File and Directory Management</p>","children":[],"payload":{"lines":"4741,4743"}},{"content":"\n<p data-lines=\"4743,4744\">Interfaces for Allocating Memory</p>","children":[],"payload":{"lines":"4743,4745"}},{"content":"\n<p data-lines=\"4745,4746\">Basic and Advanced Signal Interfaces</p>","children":[],"payload":{"lines":"4745,4747"}},{"content":"\n<p data-lines=\"4747,4748\">Clock Management</p>","children":[],"payload":{"lines":"4747,4749"}}],"payload":{"lines":"4727,4749"}},{"content":"\n<p data-lines=\"4749,4750\">Shell</p>","children":[{"content":"\n<p data-lines=\"4751,4752\">Code and Data Flow Analysis</p>","children":[],"payload":{"lines":"4751,4753"}},{"content":"\n<p data-lines=\"4753,4754\">Stack Mechanics and Data Layout</p>","children":[],"payload":{"lines":"4753,4755"}},{"content":"\n<p data-lines=\"4755,4756\">Manual Reconstruction of Data Structures</p>","children":[],"payload":{"lines":"4755,4757"}}],"payload":{"lines":"4749,4757"}},{"content":"\n<p data-lines=\"4757,4758\">Msfvenom</p>","children":[{"content":"\n<p data-lines=\"4759,4760\">Analyzing PowerShell Scripts</p>","children":[],"payload":{"lines":"4759,4761"}},{"content":"\n<p data-lines=\"4761,4762\">Decoding Msfvenom Payloads</p>","children":[],"payload":{"lines":"4761,4763"}},{"content":"\n<p data-lines=\"4763,4764\">Manual Reconstruction of Data Structures</p>","children":[],"payload":{"lines":"4763,4765"}}],"payload":{"lines":"4757,4765"}},{"content":"\n<p data-lines=\"4765,4766\">Chafer</p>","children":[{"content":"\n<p data-lines=\"4767,4768\">How to Analyze the Windows Crypto API Functions and Calls</p>","children":[],"payload":{"lines":"4767,4769"}},{"content":"\n<p data-lines=\"4769,4770\">About PE compiled with gcc: segments, DWARF debug data, names mangling</p>","children":[],"payload":{"lines":"4769,4771"}},{"content":"\n<p data-lines=\"4771,4772\">How to resolve standard enumerators to make code more readable</p>","children":[],"payload":{"lines":"4771,4773"}},{"content":"\n<p data-lines=\"4773,4774\">How to determine the encryption algorithms and keys</p>","children":[],"payload":{"lines":"4773,4775"}}],"payload":{"lines":"4765,4775"}},{"content":"\n<p data-lines=\"4775,4776\">LuckyMouse</p>","children":[{"content":"\n<p data-lines=\"4777,4778\">How to combine static and dynamic analysis with with disassembler, debugger and hex editor</p>","children":[],"payload":{"lines":"4777,4779"}},{"content":"\n<p data-lines=\"4779,4780\">How to follow all the Windows dynamic libraries search order hijacking steps</p>","children":[],"payload":{"lines":"4779,4781"}},{"content":"\n<p data-lines=\"4781,4782\">How to find custom decryption routines (implemented without CryptoAPI this time)</p>","children":[],"payload":{"lines":"4781,4783"}},{"content":"\n<p data-lines=\"4783,4784\">How to dump the PE file from memory after self-decryption</p>","children":[],"payload":{"lines":"4783,4785"}},{"content":"\n<p data-lines=\"4785,4786\">How to add structures to the IDA database like you did for enumerators in Chafer</p>","children":[],"payload":{"lines":"4785,4787"}}],"payload":{"lines":"4775,4787"}},{"content":"\n<p data-lines=\"4787,4788\">Biodata Exploit</p>","children":[{"content":"\n<p data-lines=\"4789,4790\">Files don’t have to be executable to analyze them in the disassembler</p>","children":[],"payload":{"lines":"4789,4791"}},{"content":"\n<p data-lines=\"4791,4792\">The nature of the exploits, how they initially start and operate</p>","children":[],"payload":{"lines":"4791,4793"}},{"content":"\n<p data-lines=\"4793,4794\">\"One asm instruction after another\" analysis, like you would do in any real case</p>","children":[],"payload":{"lines":"4793,4795"}}],"payload":{"lines":"4787,4795"}},{"content":"\n<p data-lines=\"4795,4796\">Topinambour</p>","children":[{"content":"\n<p data-lines=\"4797,4798\">How interpreted samples differ from compiled ones</p>","children":[],"payload":{"lines":"4797,4799"}},{"content":"\n<p data-lines=\"4799,4800\">.NET samples analysis with DnSpy</p>","children":[],"payload":{"lines":"4799,4801"}},{"content":"\n<p data-lines=\"4801,4802\">Static and dynamic scripts deobfuscation</p>","children":[],"payload":{"lines":"4801,4803"}}],"payload":{"lines":"4795,4803"}},{"content":"\n<p data-lines=\"4803,4804\">Biodata Trojan</p>","children":[{"content":"Reverse-engineering sometimes involves looking at less popular languages like Delphi","children":[],"payload":{"lines":"4805,4807"}}],"payload":{"lines":"4803,4807"}},{"content":"\n<p data-lines=\"4807,4808\">DeathStalker</p>","children":[{"content":"\n<p data-lines=\"4809,4810\">How DeathStalker, a mercenary APT, breaches law offices and wealth management firms with custom tooling</p>","children":[],"payload":{"lines":"4809,4811"}},{"content":"\n<p data-lines=\"4811,4812\">How LNK-based infection chains work and how to approach them</p>","children":[],"payload":{"lines":"4811,4813"}},{"content":"\n<p data-lines=\"4813,4814\">How to deobfuscate PowerShell scripts</p>","children":[],"payload":{"lines":"4813,4815"}},{"content":"\n<p data-lines=\"4815,4816\">Common techniques like dead-drop resolvers used by APTs and red teams</p>","children":[],"payload":{"lines":"4815,4817"}}],"payload":{"lines":"4807,4817"}},{"content":"\n<p data-lines=\"4817,4818\">MontysThree</p>","children":[{"content":"\n<p data-lines=\"4819,4820\">How to deal with steganography</p>","children":[],"payload":{"lines":"4819,4821"}},{"content":"\n<p data-lines=\"4821,4822\">How to dump embedded encryption keys</p>","children":[],"payload":{"lines":"4821,4823"}},{"content":"\n<p data-lines=\"4823,4824\">How to migrate definitions between samples with header files</p>","children":[],"payload":{"lines":"4823,4825"}}],"payload":{"lines":"4817,4825"}},{"content":"\n<p data-lines=\"4825,4826\">Lazarus Group</p>","children":[{"content":"\n<p data-lines=\"4827,4828\">Reverse-engineering x64 malware</p>","children":[],"payload":{"lines":"4827,4829"}},{"content":"\n<p data-lines=\"4829,4830\">How to reconstruct a custom network protocol from a malware sample</p>","children":[],"payload":{"lines":"4829,4831"}}],"payload":{"lines":"4825,4831"}},{"content":"\n<p data-lines=\"4831,4832\">Cloud Snooper</p>","children":[{"content":"\n<p data-lines=\"4833,4834\">Reverse-engineering Linux programs</p>","children":[],"payload":{"lines":"4833,4835"}},{"content":"\n<p data-lines=\"4835,4836\">Recognizing variants of open-source trojans</p>","children":[],"payload":{"lines":"4835,4837"}},{"content":"\n<p data-lines=\"4837,4838\">Analyzing network protocols used by backdoors</p>","children":[],"payload":{"lines":"4837,4839"}},{"content":"\n<p data-lines=\"4839,4840\">What rootkits are and how they work</p>","children":[],"payload":{"lines":"4839,4841"}}],"payload":{"lines":"4831,4841"}},{"content":"\n<p data-lines=\"4841,4842\">Cyclades’s Triad</p>","children":[{"content":"\n<p data-lines=\"4843,4844\">New obfuscation tricks used by attackers to frustrate reverse-engineering efforts and additional IDA Python tips to overcome them</p>","children":[],"payload":{"lines":"4843,4845"}},{"content":"\n<p data-lines=\"4845,4846\">How to work with shellcodes</p>","children":[],"payload":{"lines":"4845,4847"}},{"content":"\n<p data-lines=\"4847,4848\">What “Reflective DLL loading” is and how it works</p>","children":[],"payload":{"lines":"4847,4849"}},{"content":"\n<p data-lines=\"4849,4850\">Advanced Hex-Rays Decompiler techniques</p>","children":[],"payload":{"lines":"4849,4851"}}],"payload":{"lines":"4841,4851"}},{"content":"\n<p data-lines=\"4851,4852\">Bonus Track</p>","children":[{"content":"\n<p data-lines=\"4853,4854\">How to reverse-engineer Go malware</p>","children":[],"payload":{"lines":"4853,4855"}},{"content":"\n<p data-lines=\"4855,4856\">The fundamentals of the Go language</p>","children":[],"payload":{"lines":"4855,4857"}}],"payload":{"lines":"4851,4857"}},{"content":"\n<p data-lines=\"4857,4858\">Bangladesh GPCA</p>","children":[{"content":"\n<p data-lines=\"4859,4860\">Code and Data Flow Analysis</p>","children":[],"payload":{"lines":"4859,4861"}},{"content":"\n<p data-lines=\"4861,4862\">Recognizing a well-known Encryption Algorithm</p>","children":[],"payload":{"lines":"4861,4863"}},{"content":"\n<p data-lines=\"4863,4864\">Automating Decryption with a Decoding Framework</p>","children":[],"payload":{"lines":"4863,4865"}}],"payload":{"lines":"4857,4865"}},{"content":"\n<p data-lines=\"4865,4866\">Regin Driver</p>","children":[{"content":"\n<p data-lines=\"4867,4868\">Analyzing a Homebrew Crypto Algorithm</p>","children":[],"payload":{"lines":"4867,4869"}},{"content":"\n<p data-lines=\"4869,4870\">Raw offset - Virtual Address Conversions</p>","children":[],"payload":{"lines":"4869,4871"}},{"content":"\n<p data-lines=\"4871,4872\">Automating Decryption of PE Files</p>","children":[],"payload":{"lines":"4871,4873"}}],"payload":{"lines":"4865,4873"}},{"content":"\n<p data-lines=\"4873,4874\">Decrypt Strings</p>","children":[{"content":"\n<p data-lines=\"4875,4876\">Analyzing a homebrew Crypto Algorithm</p>","children":[],"payload":{"lines":"4875,4877"}},{"content":"\n<p data-lines=\"4877,4878\">Automating Decryption of Mach-O Files</p>","children":[],"payload":{"lines":"4877,4879"}},{"content":"\n<p data-lines=\"4879,4880\">Processing Multiple Encrypted Strings, Referenced as Function Arguments</p>","children":[],"payload":{"lines":"4879,4881"}}],"payload":{"lines":"4873,4881"}},{"content":"\n<p data-lines=\"4881,4882\">Driver</p>","children":[{"content":"\n<p data-lines=\"4883,4884\">Processing Encrypted Strings, Preparing the Sample for the Analysis Applying Structures, Enumerations</p>","children":[],"payload":{"lines":"4883,4885"}},{"content":"\n<p data-lines=\"4885,4886\">Re-Creating a C++ Class/Structure</p>","children":[],"payload":{"lines":"4885,4887"}},{"content":"\n<p data-lines=\"4887,4888\">In-depth Reverse Engineering of a Sample</p>","children":[],"payload":{"lines":"4887,4889"}}],"payload":{"lines":"4881,4889"}},{"content":"\n<p data-lines=\"4889,4890\">Miniduke</p>","children":[{"content":"\n<p data-lines=\"4891,4892\">Processing a Custom Assembly-Coded Shellcode</p>","children":[],"payload":{"lines":"4891,4893"}},{"content":"\n<p data-lines=\"4893,4895\">Extracting Opcode Information Without a<br>\nDisassembler</p>","children":[],"payload":{"lines":"4893,4896"}},{"content":"\n<p data-lines=\"4896,4897\">Reconstructing a Custom API Hashing Algorithm</p>","children":[],"payload":{"lines":"4896,4898"}},{"content":"\n<p data-lines=\"4898,4899\">Exporting Information to IDA Via an IDC Script</p>","children":[],"payload":{"lines":"4898,4900"}}],"payload":{"lines":"4889,4900"}},{"content":"\n<p data-lines=\"4900,4901\">Rocra</p>","children":[{"content":"\n<p data-lines=\"4902,4903\">Extracting a Binary Payload From the RTF Document</p>","children":[],"payload":{"lines":"4902,4904"}},{"content":"\n<p data-lines=\"4904,4905\">Analyzing an Exploit’s Shellcode Payload</p>","children":[],"payload":{"lines":"4904,4906"}},{"content":"\n<p data-lines=\"4906,4907\">Extracting the Final Payload From the Document</p>","children":[],"payload":{"lines":"4906,4908"}}],"payload":{"lines":"4900,4908"}},{"content":"\n<p data-lines=\"4908,4909\">Cobalt</p>","children":[{"content":"Using oletools to Inspect an OLE2 Container","children":[],"payload":{"lines":"4910,4912"}}],"payload":{"lines":"4908,4912"}},{"content":"\n<p data-lines=\"4912,4913\">Cloud Atlas</p>","children":[{"content":"\n<p data-lines=\"4914,4915\">Extracting binary data from a crafted RTF document</p>","children":[],"payload":{"lines":"4914,4916"}},{"content":"\n<p data-lines=\"4916,4917\">Using oletools to Inspect an OLE2 Container</p>","children":[],"payload":{"lines":"4916,4918"}},{"content":"\n<p data-lines=\"4918,4919\">Analyzing Binary and Scriptable (VBS) Payloads</p>","children":[],"payload":{"lines":"4918,4920"}}],"payload":{"lines":"4912,4920"}},{"content":"\n<p data-lines=\"4920,4921\">Miniduke PDF</p>","children":[{"content":"\n<p data-lines=\"4922,4923\">Analyzing a Malicious PDF Document</p>","children":[],"payload":{"lines":"4922,4924"}},{"content":"\n<p data-lines=\"4924,4925\">Inspecting a ROP-building Javascript</p>","children":[],"payload":{"lines":"4924,4926"}},{"content":"\n<p data-lines=\"4926,4927\">Reconstructing a ROP Chain</p>","children":[],"payload":{"lines":"4926,4928"}}],"payload":{"lines":"4920,4928"}},{"content":"\n<p data-lines=\"4928,4929\">Ragua Py2exe</p>","children":[{"content":"\n<p data-lines=\"4930,4931\">Extracting a py2exe Binary</p>","children":[],"payload":{"lines":"4930,4932"}},{"content":"\n<p data-lines=\"4932,4933\">Decompiling Python Bytecode</p>","children":[],"payload":{"lines":"4932,4934"}}],"payload":{"lines":"4928,4934"}},{"content":"\n<p data-lines=\"4934,4935\">Cridex</p>","children":[{"content":"\n<p data-lines=\"4936,4937\">Dynamically Unpacking/Decrypting</p>","children":[],"payload":{"lines":"4936,4938"}},{"content":"\n<p data-lines=\"4938,4939\">Windows Executables</p>","children":[],"payload":{"lines":"4938,4940"}}],"payload":{"lines":"4934,4940"}},{"content":"\n<p data-lines=\"4940,4941\">Carbanak</p>","children":[{"content":"Analyzing and Dynamically npacking/Decrypting Windows .NET Executables","children":[],"payload":{"lines":"4942,4944"}}],"payload":{"lines":"4940,4944"}},{"content":"\n<p data-lines=\"4944,4945\">Snake</p>","children":[{"content":"\n<p data-lines=\"4946,4947\">Analyzing Golang Samples</p>","children":[],"payload":{"lines":"4946,4948"}},{"content":"\n<p data-lines=\"4948,4949\">Mapping Basic Golang Structures</p>","children":[],"payload":{"lines":"4948,4950"}},{"content":"\n<p data-lines=\"4950,4951\">Extracting and Decrypting Golang String Literals</p>","children":[],"payload":{"lines":"4950,4952"}}],"payload":{"lines":"4944,4952"}}],"payload":{"lines":"4709,4952"}},{"content":"\n<p data-lines=\"4952,4953\">Mobile</p>","children":[{"content":"\n<p data-lines=\"4954,4955\">Essentials</p>","children":[{"content":"\n<p data-lines=\"4956,4957\">Android Security Models: DAC/MAC, SafetyNet</p>","children":[],"payload":{"lines":"4956,4958"}},{"content":"\n<p data-lines=\"4958,4959\">The Android Package Structure Manifest with Entry Points, Dalvik Bytecode and Native Code</p>","children":[],"payload":{"lines":"4958,4960"}},{"content":"\n<p data-lines=\"4960,4961\">Static Analysis Tools</p>","children":[],"payload":{"lines":"4960,4962"}},{"content":"\n<p data-lines=\"4962,4963\">Dynamic Analysis Tools</p>","children":[],"payload":{"lines":"4962,4964"}}],"payload":{"lines":"4954,4964"}},{"content":"\n<p data-lines=\"4964,4965\">DuKong</p>","children":[{"content":"\n<p data-lines=\"4966,4967\">Surface Entropy, Signature, Strings and Unpacking</p>","children":[],"payload":{"lines":"4966,4968"}},{"content":"\n<p data-lines=\"4968,4969\">Manifest Research, Suspicious Permissions, Broadcast Receivers and Services</p>","children":[],"payload":{"lines":"4968,4970"}},{"content":"\n<p data-lines=\"4970,4971\">Decompilation Procedure</p>","children":[],"payload":{"lines":"4970,4972"}}],"payload":{"lines":"4964,4972"}},{"content":"\n<p data-lines=\"4972,4973\">LightSpy</p>","children":[{"content":"\n<p data-lines=\"4974,4975\">Structure of the Most Popular Packer for Android</p>","children":[],"payload":{"lines":"4974,4976"}},{"content":"\n<p data-lines=\"4976,4977\">Dynamic File Analysis</p>","children":[],"payload":{"lines":"4976,4978"}}],"payload":{"lines":"4972,4978"}},{"content":"\n<p data-lines=\"4978,4979\">MagicKarakurt</p>","children":[{"content":"\n<p data-lines=\"4980,4981\">Java Native Interface Connection</p>","children":[],"payload":{"lines":"4980,4982"}},{"content":"\n<p data-lines=\"4982,4983\">Ghidra JNI Correct Code Decompilation</p>","children":[],"payload":{"lines":"4982,4984"}}],"payload":{"lines":"4978,4984"}},{"content":"\n<p data-lines=\"4984,4985\">LightSpy iOS</p>","children":[{"content":"How to Deal with iOS Malware Objective-C Selector Calls","children":[],"payload":{"lines":"4986,4988"}}],"payload":{"lines":"4984,4988"}}],"payload":{"lines":"4952,4988"}}],"payload":{"lines":"4697,4988"}}],"payload":{"lines":"4673,4988"}},{"content":"\n<p data-lines=\"4988,4989\">Threat Hunting</p>","children":[{"content":"\n<p data-lines=\"4990,4991\">Prerequisites</p>","children":[{"content":"\n<p data-lines=\"4992,4993\">Basics of Network</p>","children":[],"payload":{"lines":"4992,4994"}},{"content":"\n<p data-lines=\"4994,4995\">Basics of Linux</p>","children":[],"payload":{"lines":"4994,4996"}},{"content":"\n<p data-lines=\"4996,4997\">Basics of HTML and CSS</p>","children":[],"payload":{"lines":"4996,4998"}},{"content":"\n<p data-lines=\"4998,4999\">Basics of JavaScript</p>","children":[],"payload":{"lines":"4998,5000"}},{"content":"\n<p data-lines=\"5000,5001\">Basics of C-Sharp</p>","children":[],"payload":{"lines":"5000,5002"}},{"content":"\n<p data-lines=\"5002,5003\">Professional Powershell</p>","children":[],"payload":{"lines":"5002,5004"}},{"content":"\n<p data-lines=\"5004,5005\">Professional C/C++</p>","children":[],"payload":{"lines":"5004,5006"}},{"content":"\n<p data-lines=\"5006,5007\">Professional x86/x64 Assembly</p>","children":[],"payload":{"lines":"5006,5008"}}],"payload":{"lines":"4990,5008"}},{"content":"\n<p data-lines=\"5008,5009\">Syllabus</p>","children":[{"content":"\n<p data-lines=\"5010,5011\">Introduction</p>","children":[{"content":"\n<p data-lines=\"5012,5013\">TTP Hunting</p>","children":[],"payload":{"lines":"5012,5014"}},{"content":"\n<p data-lines=\"5014,5015\">WMI Consumer Hunting</p>","children":[],"payload":{"lines":"5014,5016"}},{"content":"\n<p data-lines=\"5016,5017\">Linux Service Hunting</p>","children":[],"payload":{"lines":"5016,5018"}},{"content":"\n<p data-lines=\"5018,5019\">Domain Anomaly Hunting</p>","children":[],"payload":{"lines":"5018,5020"}}],"payload":{"lines":"5010,5020"}},{"content":"\n<p data-lines=\"5020,5021\">Windows ENV Hunting</p>","children":[{"content":"\n<p data-lines=\"5022,5023\">Searching for the Actions of Adversaries From the Logs</p>","children":[],"payload":{"lines":"5022,5024"}},{"content":"\n<p data-lines=\"5024,5025\">Matching Attacking Techniques with the MITRE ATT&CK Matrix</p>","children":[],"payload":{"lines":"5024,5026"}},{"content":"\n<p data-lines=\"5026,5027\">Using Windows Audit for Investigations</p>","children":[],"payload":{"lines":"5026,5028"}}],"payload":{"lines":"5020,5028"}},{"content":"\n<p data-lines=\"5028,5029\">Linux Attack Vectors and Hunting</p>","children":[{"content":"\n<p data-lines=\"5030,5031\">Linux General Info</p>","children":[],"payload":{"lines":"5030,5032"}},{"content":"\n<p data-lines=\"5032,5033\">Linux Security Components</p>","children":[],"payload":{"lines":"5032,5034"}},{"content":"\n<p data-lines=\"5034,5035\">Linux Monitoring</p>","children":[],"payload":{"lines":"5034,5036"}},{"content":"\n<p data-lines=\"5036,5037\">Linux Capabilities</p>","children":[],"payload":{"lines":"5036,5038"}},{"content":"\n<p data-lines=\"5038,5039\">Auditing System</p>","children":[],"payload":{"lines":"5038,5040"}}],"payload":{"lines":"5028,5040"}},{"content":"\n<p data-lines=\"5040,5041\">Network Threat Hunting</p>","children":[{"content":"\n<p data-lines=\"5042,5043\">Basics of Network Technologies</p>","children":[],"payload":{"lines":"5042,5044"}},{"content":"\n<p data-lines=\"5044,5045\">Common Approaches to the Network Security</p>","children":[],"payload":{"lines":"5044,5046"}},{"content":"\n<p data-lines=\"5046,5047\">Network Security Monitoring</p>","children":[],"payload":{"lines":"5046,5048"}},{"content":"\n<p data-lines=\"5048,5049\">Specialized Network Devices</p>","children":[],"payload":{"lines":"5048,5050"}}],"payload":{"lines":"5040,5050"}},{"content":"\n<p data-lines=\"5050,5051\">Suricata Basics</p>","children":[{"content":"\n<p data-lines=\"5052,5053\">About Network Protocols</p>","children":[],"payload":{"lines":"5052,5054"}},{"content":"\n<p data-lines=\"5054,5055\">What is NIDS? The Principles of Their Work and Their Main Functions</p>","children":[],"payload":{"lines":"5054,5056"}},{"content":"\n<p data-lines=\"5056,5057\">Most Popular NIDS and The Differences Between Them</p>","children":[],"payload":{"lines":"5056,5058"}},{"content":"\n<p data-lines=\"5058,5059\">Useful Tools for Network Traffic Analysis</p>","children":[],"payload":{"lines":"5058,5060"}}],"payload":{"lines":"5050,5060"}},{"content":"\n<p data-lines=\"5060,5061\">Rules Writing Basics</p>","children":[{"content":"\n<p data-lines=\"5062,5063\">Strings-Based Rules</p>","children":[],"payload":{"lines":"5062,5064"}},{"content":"\n<p data-lines=\"5064,5065\">Structure and Syntax of Suricata Rules</p>","children":[],"payload":{"lines":"5064,5066"}},{"content":"\n<p data-lines=\"5066,5067\">Basic Keywords</p>","children":[],"payload":{"lines":"5066,5068"}},{"content":"\n<p data-lines=\"5068,5069\">Selecting Good Options for a Rule</p>","children":[],"payload":{"lines":"5068,5070"}},{"content":"\n<p data-lines=\"5070,5071\">Yara’s PE Library</p>","children":[],"payload":{"lines":"5070,5072"}},{"content":"\n<p data-lines=\"5072,5073\">Digital Certificates, Imphashes</p>","children":[],"payload":{"lines":"5072,5074"}},{"content":"\n<p data-lines=\"5074,5075\">Hunting for new Undetected Samples on VTI</p>","children":[],"payload":{"lines":"5074,5076"}},{"content":"\n<p data-lines=\"5076,5077\">Malicious Office Documents, OLE Format</p>","children":[],"payload":{"lines":"5076,5078"}},{"content":"\n<p data-lines=\"5078,5079\">YarGen, Automation and a Bit of Magic</p>","children":[],"payload":{"lines":"5078,5080"}}],"payload":{"lines":"5060,5080"}},{"content":"\n<p data-lines=\"5080,5081\">Writing Rules for HTTP Protocols</p>","children":[{"content":"\n<p data-lines=\"5082,5083\">Specific Keywords for HTTP Protocols</p>","children":[],"payload":{"lines":"5082,5084"}},{"content":"\n<p data-lines=\"5084,5085\">How to Write a Rule Step-by-Stepl</p>","children":[],"payload":{"lines":"5084,5086"}},{"content":"\n<p data-lines=\"5086,5087\">Writing Rules for an HTTP Protocol for a Given Traffic Dump</p>","children":[],"payload":{"lines":"5086,5088"}}],"payload":{"lines":"5080,5088"}},{"content":"\n<p data-lines=\"5088,5089\">Writing Rules for DNS, TSP and SSL/TLS Protocols</p>","children":[{"content":"\n<p data-lines=\"5090,5091\">Basic information about DNS, TCP and SSL/TLS protocols</p>","children":[],"payload":{"lines":"5090,5092"}},{"content":"\n<p data-lines=\"5092,5093\">Keywords and Tips for Writing Rules for These Protocols</p>","children":[],"payload":{"lines":"5092,5094"}},{"content":"\n<p data-lines=\"5094,5095\">Writing Rules for DNS, TCP and SSL/TLS Protocols for a Given Traffic Dump</p>","children":[],"payload":{"lines":"5094,5096"}}],"payload":{"lines":"5088,5096"}},{"content":"\n<p data-lines=\"5096,5097\">Advanced Suricata Features</p>","children":[{"content":"\n<p data-lines=\"5098,5099\">Advanced Rule Options that aren’t Always Necessary but Can Help a lot in Some Cases</p>","children":[],"payload":{"lines":"5098,5100"}},{"content":"\n<p data-lines=\"5100,5101\">Selecting Best Options for a Rule Writing Rules for a Given Traffic Dump</p>","children":[],"payload":{"lines":"5100,5102"}}],"payload":{"lines":"5096,5102"}},{"content":"\n<p data-lines=\"5102,5103\">Detecting Typical Attacks</p>","children":[{"content":"\n<p data-lines=\"5104,5105\">About Popular Network Attacks and How to Detect Them</p>","children":[],"payload":{"lines":"5104,5106"}},{"content":"\n<p data-lines=\"5106,5107\">Writing Rules to Detect Typical Attacks for a Given Traffic Dump</p>","children":[],"payload":{"lines":"5106,5108"}}],"payload":{"lines":"5102,5108"}},{"content":"\n<p data-lines=\"5108,5109\">Problem Solving</p>","children":[{"content":"\n<p data-lines=\"5110,5111\">Problems When Writing Suricata Rules</p>","children":[],"payload":{"lines":"5110,5112"}},{"content":"\n<p data-lines=\"5112,5113\">How to Check Rule Performance</p>","children":[],"payload":{"lines":"5112,5114"}},{"content":"\n<p data-lines=\"5114,5115\">How to Fix False Positives</p>","children":[],"payload":{"lines":"5114,5116"}},{"content":"\n<p data-lines=\"5116,5117\">How to Write \"Good\" Rules</p>","children":[],"payload":{"lines":"5116,5118"}},{"content":"\n<p data-lines=\"5118,5119\">Solving Typical Problems</p>","children":[],"payload":{"lines":"5118,5120"}},{"content":"\n<p data-lines=\"5120,5121\">Fixing False Positives</p>","children":[],"payload":{"lines":"5120,5122"}}],"payload":{"lines":"5108,5122"}}],"payload":{"lines":"5008,5122"}}],"payload":{"lines":"4988,5122"}},{"content":"\n<p data-lines=\"5122,5123\">Incident Response</p>","children":[{"content":"\n<p data-lines=\"5124,5125\">Prerequisites</p>","children":[{"content":"\n<p data-lines=\"5126,5127\">Basics of Network</p>","children":[],"payload":{"lines":"5126,5128"}},{"content":"\n<p data-lines=\"5128,5129\">Basics of Linux</p>","children":[],"payload":{"lines":"5128,5130"}},{"content":"\n<p data-lines=\"5130,5131\">Professional Python</p>","children":[],"payload":{"lines":"5130,5132"}},{"content":"\n<p data-lines=\"5132,5133\">Professional Powershell</p>","children":[],"payload":{"lines":"5132,5134"}}],"payload":{"lines":"5124,5134"}},{"content":"\n<p data-lines=\"5134,5135\">Syllabus</p>","children":[{"content":"\n<p data-lines=\"5136,5137\">Introduction</p>","children":[{"content":"\n<p data-lines=\"5138,5139\">Information Security</p>","children":[],"payload":{"lines":"5138,5140"}},{"content":"\n<p data-lines=\"5140,5141\">Cyber Threat Landscape</p>","children":[],"payload":{"lines":"5140,5142"}},{"content":"\n<p data-lines=\"5142,5143\">Cyber Kill Chain</p>","children":[],"payload":{"lines":"5142,5144"}},{"content":"\n<p data-lines=\"5144,5145\">Open-Source Intelligence</p>","children":[],"payload":{"lines":"5144,5146"}}],"payload":{"lines":"5136,5146"}},{"content":"\n<p data-lines=\"5146,5147\">IR Process</p>","children":[{"content":"\n<p data-lines=\"5148,5149\">Preparation</p>","children":[{"content":"\n<p data-lines=\"5150,5151\">Practice</p>","children":[],"payload":{"lines":"5150,5152"}},{"content":"\n<p data-lines=\"5152,5153\">Take Trainings</p>","children":[],"payload":{"lines":"5152,5154"}},{"content":"\n<p data-lines=\"5154,5155\">Raise Personnel Awareness</p>","children":[],"payload":{"lines":"5154,5156"}},{"content":"\n<p data-lines=\"5156,5157\">Make Personnel Report Suspicious Activity</p>","children":[],"payload":{"lines":"5156,5158"}},{"content":"\n<p data-lines=\"5158,5159\">Set Up Relevant Data Collection</p>","children":[],"payload":{"lines":"5158,5160"}},{"content":"\n<p data-lines=\"5160,5161\">Set Up a Centralized Long-Term Log Storage</p>","children":[],"payload":{"lines":"5160,5162"}},{"content":"\n<p data-lines=\"5162,5163\">Develop Communication Map</p>","children":[],"payload":{"lines":"5162,5164"}},{"content":"\n<p data-lines=\"5164,5165\">Make Sure There are Backups</p>","children":[],"payload":{"lines":"5164,5166"}},{"content":"\n<p data-lines=\"5166,5167\">Get Network Architecture Map</p>","children":[],"payload":{"lines":"5166,5168"}},{"content":"\n<p data-lines=\"5168,5169\">Get Access Control Matrix</p>","children":[],"payload":{"lines":"5168,5170"}},{"content":"\n<p data-lines=\"5170,5171\">Develop Assets Knowledge Base</p>","children":[],"payload":{"lines":"5170,5172"}},{"content":"\n<p data-lines=\"5172,5173\">Check Analysis Toolset</p>","children":[],"payload":{"lines":"5172,5174"}},{"content":"\n<p data-lines=\"5174,5175\">Access Vulnerability Management System Logs</p>","children":[],"payload":{"lines":"5174,5176"}},{"content":"\n<p data-lines=\"5176,5177\">Connect with Trusted Communities</p>","children":[],"payload":{"lines":"5176,5178"}},{"content":"\n<p data-lines=\"5178,5179\">Access External Network Flow Logs</p>","children":[],"payload":{"lines":"5178,5180"}},{"content":"\n<p data-lines=\"5180,5181\">Access Internal Network Flow Logs</p>","children":[],"payload":{"lines":"5180,5182"}},{"content":"\n<p data-lines=\"5182,5183\">Access Internal HTTP Logs</p>","children":[],"payload":{"lines":"5182,5184"}},{"content":"\n<p data-lines=\"5184,5185\">Access External HTTP Logs</p>","children":[],"payload":{"lines":"5184,5186"}},{"content":"\n<p data-lines=\"5186,5187\">Access Internal DNS Logs</p>","children":[],"payload":{"lines":"5186,5188"}},{"content":"\n<p data-lines=\"5188,5189\">Access External DNS Logs</p>","children":[],"payload":{"lines":"5188,5190"}},{"content":"\n<p data-lines=\"5190,5191\">Access VPN Logs</p>","children":[],"payload":{"lines":"5190,5192"}},{"content":"\n<p data-lines=\"5192,5193\">Access DHCP Logs</p>","children":[],"payload":{"lines":"5192,5194"}},{"content":"\n<p data-lines=\"5194,5195\">Access Internal Packet Capture Data</p>","children":[],"payload":{"lines":"5194,5196"}},{"content":"\n<p data-lines=\"5196,5197\">Access External Packet Capture Data</p>","children":[],"payload":{"lines":"5196,5198"}},{"content":"\n<p data-lines=\"5198,5199\">Get Ability to Block External IP Address</p>","children":[],"payload":{"lines":"5198,5200"}},{"content":"\n<p data-lines=\"5200,5201\">Get Ability to Block Internal IP Address</p>","children":[],"payload":{"lines":"5200,5202"}},{"content":"\n<p data-lines=\"5202,5203\">Get Ability to Block External Domain</p>","children":[],"payload":{"lines":"5202,5204"}},{"content":"\n<p data-lines=\"5204,5205\">Get Ability to Block Internal Domain</p>","children":[],"payload":{"lines":"5204,5206"}},{"content":"\n<p data-lines=\"5206,5207\">Get Ability to Block External URL</p>","children":[],"payload":{"lines":"5206,5208"}},{"content":"\n<p data-lines=\"5208,5209\">Get Ability to Block Internal URL</p>","children":[],"payload":{"lines":"5208,5210"}},{"content":"\n<p data-lines=\"5210,5211\">Get Ability to Block Port External Communication</p>","children":[],"payload":{"lines":"5210,5212"}},{"content":"\n<p data-lines=\"5212,5213\">Get Ability to Block Port Internal Communication</p>","children":[],"payload":{"lines":"5212,5214"}},{"content":"\n<p data-lines=\"5214,5215\">Get Ability to Block User External Communication</p>","children":[],"payload":{"lines":"5214,5216"}},{"content":"\n<p data-lines=\"5216,5217\">Get Ability to Block User Internal Communication</p>","children":[],"payload":{"lines":"5216,5218"}},{"content":"\n<p data-lines=\"5218,5219\">Get Ability to Find Data Transferred by Content Pattern</p>","children":[],"payload":{"lines":"5218,5220"}},{"content":"\n<p data-lines=\"5220,5221\">Get Ability to Block Data Transferring by Content Pattern</p>","children":[],"payload":{"lines":"5220,5222"}},{"content":"\n<p data-lines=\"5222,5223\">Get Ability to List Data Transferred</p>","children":[],"payload":{"lines":"5222,5224"}},{"content":"\n<p data-lines=\"5224,5225\">Get Ability to Collect Transferred Data</p>","children":[],"payload":{"lines":"5224,5226"}},{"content":"\n<p data-lines=\"5226,5227\">Get Ability to Identify Transferred Data</p>","children":[],"payload":{"lines":"5226,5228"}},{"content":"\n<p data-lines=\"5228,5229\">Find Data Transferred by Content Pattern</p>","children":[],"payload":{"lines":"5228,5230"}},{"content":"\n<p data-lines=\"5230,5231\">Get Ability to Analyse User-Agent</p>","children":[],"payload":{"lines":"5230,5232"}},{"content":"\n<p data-lines=\"5232,5233\">Get Ability to List Firewall Rules</p>","children":[],"payload":{"lines":"5232,5234"}},{"content":"\n<p data-lines=\"5234,5235\">Get Ability to List Users Opened Email Message</p>","children":[],"payload":{"lines":"5234,5236"}},{"content":"\n<p data-lines=\"5236,5237\">Get Ability to List Email Message Receivers</p>","children":[],"payload":{"lines":"5236,5238"}},{"content":"\n<p data-lines=\"5238,5239\">Get Ability to Block Email Domain</p>","children":[],"payload":{"lines":"5238,5240"}},{"content":"\n<p data-lines=\"5240,5241\">Get Ability to Block Email Sender</p>","children":[],"payload":{"lines":"5240,5242"}},{"content":"\n<p data-lines=\"5242,5243\">Get Ability to Delete Email Message</p>","children":[],"payload":{"lines":"5242,5244"}},{"content":"\n<p data-lines=\"5244,5245\">Get Ability to Quarantine Email Message</p>","children":[],"payload":{"lines":"5244,5246"}},{"content":"\n<p data-lines=\"5246,5247\">Get Ability to Collect Email Message</p>","children":[],"payload":{"lines":"5246,5248"}},{"content":"\n<p data-lines=\"5248,5249\">Get Ability to Analyse Email Address</p>","children":[],"payload":{"lines":"5248,5250"}},{"content":"\n<p data-lines=\"5250,5251\">Get Ability to List Files Created</p>","children":[],"payload":{"lines":"5250,5252"}},{"content":"\n<p data-lines=\"5252,5253\">Get Ability to List Files Modified</p>","children":[],"payload":{"lines":"5252,5254"}},{"content":"\n<p data-lines=\"5254,5255\">Get Ability to List Files Deleted</p>","children":[],"payload":{"lines":"5254,5256"}},{"content":"\n<p data-lines=\"5256,5257\">Get Ability to List Files Downloaded</p>","children":[],"payload":{"lines":"5256,5258"}},{"content":"\n<p data-lines=\"5258,5259\">Get Ability to List Files with Tampered Timestamps</p>","children":[],"payload":{"lines":"5258,5260"}},{"content":"\n<p data-lines=\"5260,5261\">Get Ability to Find File by Path</p>","children":[],"payload":{"lines":"5260,5262"}},{"content":"\n<p data-lines=\"5262,5263\">Get Ability to Find File by Metadata</p>","children":[],"payload":{"lines":"5262,5264"}},{"content":"\n<p data-lines=\"5264,5265\">Get Ability to Find File by Hash</p>","children":[],"payload":{"lines":"5264,5266"}},{"content":"\n<p data-lines=\"5266,5267\">Get Ability to Find File by Format</p>","children":[],"payload":{"lines":"5266,5268"}},{"content":"\n<p data-lines=\"5268,5269\">Get Ability to Find File by Content Pattern</p>","children":[],"payload":{"lines":"5268,5270"}},{"content":"\n<p data-lines=\"5270,5271\">Get Ability to Collect File</p>","children":[],"payload":{"lines":"5270,5272"}},{"content":"\n<p data-lines=\"5272,5273\">Get Ability to Quarantine File by Path</p>","children":[],"payload":{"lines":"5272,5274"}},{"content":"\n<p data-lines=\"5274,5275\">Get Ability to Quarantine File by Hash</p>","children":[],"payload":{"lines":"5274,5276"}},{"content":"\n<p data-lines=\"5276,5277\">Get Ability to Quarantine File by Format</p>","children":[],"payload":{"lines":"5276,5278"}},{"content":"\n<p data-lines=\"5278,5279\">Get Ability to Quarantine File by Content Pattern</p>","children":[],"payload":{"lines":"5278,5280"}},{"content":"\n<p data-lines=\"5280,5281\">Get Ability to Remove File</p>","children":[],"payload":{"lines":"5280,5282"}},{"content":"\n<p data-lines=\"5282,5283\">Get Ability to Analyse File Hash</p>","children":[],"payload":{"lines":"5282,5284"}},{"content":"\n<p data-lines=\"5284,5285\">Get Ability to Analyse Windows PE</p>","children":[],"payload":{"lines":"5284,5286"}},{"content":"\n<p data-lines=\"5286,5287\">Get Ability to Analyse Macos Macho</p>","children":[],"payload":{"lines":"5286,5288"}},{"content":"\n<p data-lines=\"5288,5289\">Get Ability to Analyse Unix ELF</p>","children":[],"payload":{"lines":"5288,5290"}},{"content":"\n<p data-lines=\"5290,5291\">Get Ability to Analyse MS Office File</p>","children":[],"payload":{"lines":"5290,5292"}},{"content":"\n<p data-lines=\"5292,5293\">Get Ability to Analyse PDF File</p>","children":[],"payload":{"lines":"5292,5294"}},{"content":"\n<p data-lines=\"5294,5295\">Get Ability to Analyse Script</p>","children":[],"payload":{"lines":"5294,5296"}},{"content":"\n<p data-lines=\"5296,5297\">Get Ability to Analyse JAR</p>","children":[],"payload":{"lines":"5296,5298"}},{"content":"\n<p data-lines=\"5298,5299\">Get Ability to Analyse Filename</p>","children":[],"payload":{"lines":"5298,5300"}},{"content":"\n<p data-lines=\"5300,5301\">Get Ability to List Processes Executed</p>","children":[],"payload":{"lines":"5300,5302"}},{"content":"\n<p data-lines=\"5302,5303\">Get Ability to Find Process by Executable Path</p>","children":[],"payload":{"lines":"5302,5304"}},{"content":"\n<p data-lines=\"5304,5305\">Get Ability to Find Process by Executable Metadata</p>","children":[],"payload":{"lines":"5304,5306"}},{"content":"\n<p data-lines=\"5306,5307\">Get Ability to Find Process by Executable Hash</p>","children":[],"payload":{"lines":"5306,5308"}},{"content":"\n<p data-lines=\"5308,5309\">Get Ability to Find Process by Executable Format</p>","children":[],"payload":{"lines":"5308,5310"}},{"content":"\n<p data-lines=\"5310,5311\">Get Ability to Find Process by Executable Content Pattern</p>","children":[],"payload":{"lines":"5310,5312"}},{"content":"\n<p data-lines=\"5312,5313\">Get Ability to Block Process by Executable Path</p>","children":[],"payload":{"lines":"5312,5314"}},{"content":"\n<p data-lines=\"5314,5315\">Get Ability to Block Process by Executable Metadata</p>","children":[],"payload":{"lines":"5314,5316"}},{"content":"\n<p data-lines=\"5316,5317\">Get Ability to Block Process by Executable Hash</p>","children":[],"payload":{"lines":"5316,5318"}},{"content":"\n<p data-lines=\"5318,5319\">Get Ability to Block Process by Executable Format</p>","children":[],"payload":{"lines":"5318,5320"}},{"content":"\n<p data-lines=\"5320,5321\">Get Ability to Block Process by Executable Content Pattern</p>","children":[],"payload":{"lines":"5320,5322"}},{"content":"\n<p data-lines=\"5322,5323\">Manage Remote Computer Management System Policies</p>","children":[],"payload":{"lines":"5322,5324"}},{"content":"\n<p data-lines=\"5324,5325\">Get Ability to List Registry Keys Modified</p>","children":[],"payload":{"lines":"5324,5326"}},{"content":"\n<p data-lines=\"5326,5327\">Get Ability to List Registry Keys Deleted</p>","children":[],"payload":{"lines":"5326,5328"}},{"content":"\n<p data-lines=\"5328,5329\">Get Ability to List Registry Keys Accessed</p>","children":[],"payload":{"lines":"5328,5330"}},{"content":"\n<p data-lines=\"5330,5331\">Get Ability to List Registry Keys Created</p>","children":[],"payload":{"lines":"5330,5332"}},{"content":"\n<p data-lines=\"5332,5333\">Get Ability to List Services Created</p>","children":[],"payload":{"lines":"5332,5334"}},{"content":"\n<p data-lines=\"5334,5335\">Get Ability to List Services Modified</p>","children":[],"payload":{"lines":"5334,5336"}},{"content":"\n<p data-lines=\"5336,5337\">Get Ability to List Services Deleted</p>","children":[],"payload":{"lines":"5336,5338"}},{"content":"\n<p data-lines=\"5338,5339\">Get Ability to Remove Registry Key</p>","children":[],"payload":{"lines":"5338,5340"}},{"content":"\n<p data-lines=\"5340,5341\">Get Ability to Remove Service</p>","children":[],"payload":{"lines":"5340,5342"}},{"content":"\n<p data-lines=\"5342,5343\">Get Ability to Analyse Registry Key</p>","children":[],"payload":{"lines":"5342,5344"}},{"content":"\n<p data-lines=\"5344,5345\">Manage Identity Management System</p>","children":[],"payload":{"lines":"5344,5346"}},{"content":"\n<p data-lines=\"5346,5347\">Get Ability to Lock User Account</p>","children":[],"payload":{"lines":"5346,5348"}},{"content":"\n<p data-lines=\"5348,5349\">Get Ability to List Users Authenticated</p>","children":[],"payload":{"lines":"5348,5350"}},{"content":"\n<p data-lines=\"5350,5351\">Get Ability to Revoke Authentication Credentials</p>","children":[],"payload":{"lines":"5350,5352"}},{"content":"\n<p data-lines=\"5352,5353\">Get Ability to Remove User Account</p>","children":[],"payload":{"lines":"5352,5354"}},{"content":"\n<p data-lines=\"5354,5355\">Get Ability to List User Accounts</p>","children":[],"payload":{"lines":"5354,5356"}}],"payload":{"lines":"5148,5356"}},{"content":"\n<p data-lines=\"5356,5357\">Identification</p>","children":[{"content":"\n<p data-lines=\"5358,5359\">List Victims of Security Alert</p>","children":[],"payload":{"lines":"5358,5360"}},{"content":"\n<p data-lines=\"5360,5361\">List Host Vulnerabilities</p>","children":[],"payload":{"lines":"5360,5362"}},{"content":"\n<p data-lines=\"5362,5363\">Put Compromised Accounts on Monitoring</p>","children":[],"payload":{"lines":"5362,5364"}},{"content":"\n<p data-lines=\"5364,5365\">List Hosts Communicated with Internal Domain</p>","children":[],"payload":{"lines":"5364,5366"}},{"content":"\n<p data-lines=\"5366,5367\">List Hosts Communicated with Internal IP</p>","children":[],"payload":{"lines":"5366,5368"}},{"content":"\n<p data-lines=\"5368,5369\">List Hosts Communicated with Internal URL</p>","children":[],"payload":{"lines":"5368,5370"}},{"content":"\n<p data-lines=\"5370,5371\">Analyse Domain Name</p>","children":[],"payload":{"lines":"5370,5372"}},{"content":"\n<p data-lines=\"5372,5373\">Analyse IP</p>","children":[],"payload":{"lines":"5372,5374"}},{"content":"\n<p data-lines=\"5374,5375\">Analyse URI</p>","children":[],"payload":{"lines":"5374,5376"}},{"content":"\n<p data-lines=\"5376,5377\">List Hosts Communicated by Port</p>","children":[],"payload":{"lines":"5376,5378"}},{"content":"\n<p data-lines=\"5378,5379\">List Hosts Connected to VPN</p>","children":[],"payload":{"lines":"5378,5380"}},{"content":"\n<p data-lines=\"5380,5381\">List Hosts Connected to Intranet</p>","children":[],"payload":{"lines":"5380,5382"}},{"content":"\n<p data-lines=\"5382,5383\">List Data Transferred</p>","children":[],"payload":{"lines":"5382,5384"}},{"content":"\n<p data-lines=\"5384,5385\">Collect Transferred Data</p>","children":[],"payload":{"lines":"5384,5386"}},{"content":"\n<p data-lines=\"5386,5387\">Identify Transferred Data</p>","children":[],"payload":{"lines":"5386,5388"}},{"content":"\n<p data-lines=\"5388,5389\">List Hosts Communicated with External Domain</p>","children":[],"payload":{"lines":"5388,5390"}},{"content":"\n<p data-lines=\"5390,5391\">List Hosts Communicated with External IP</p>","children":[],"payload":{"lines":"5390,5392"}},{"content":"\n<p data-lines=\"5392,5393\">List Hosts Communicated with External URL</p>","children":[],"payload":{"lines":"5392,5394"}},{"content":"\n<p data-lines=\"5394,5395\">Find Data Transferred by Content Pattern</p>","children":[],"payload":{"lines":"5394,5396"}},{"content":"\n<p data-lines=\"5396,5397\">Analyse User-Agent</p>","children":[],"payload":{"lines":"5396,5398"}},{"content":"\n<p data-lines=\"5398,5399\">List Firewall Rules</p>","children":[],"payload":{"lines":"5398,5400"}},{"content":"\n<p data-lines=\"5400,5401\">List Users Opened Email Message</p>","children":[],"payload":{"lines":"5400,5402"}},{"content":"\n<p data-lines=\"5402,5403\">Collect Email Message</p>","children":[],"payload":{"lines":"5402,5404"}},{"content":"\n<p data-lines=\"5404,5405\">List Email Message Receivers</p>","children":[],"payload":{"lines":"5404,5406"}},{"content":"\n<p data-lines=\"5406,5407\">Make Sure Email Message is Phishing</p>","children":[],"payload":{"lines":"5406,5408"}},{"content":"\n<p data-lines=\"5408,5409\">Extract Observables From Email Message</p>","children":[],"payload":{"lines":"5408,5410"}},{"content":"\n<p data-lines=\"5410,5411\">Analyse Email Address</p>","children":[],"payload":{"lines":"5410,5412"}},{"content":"\n<p data-lines=\"5412,5413\">List Files Created</p>","children":[],"payload":{"lines":"5412,5414"}},{"content":"\n<p data-lines=\"5414,5415\">List Files Modified</p>","children":[],"payload":{"lines":"5414,5416"}},{"content":"\n<p data-lines=\"5416,5417\">List Files Deleted</p>","children":[],"payload":{"lines":"5416,5418"}},{"content":"\n<p data-lines=\"5418,5419\">List Files Downloaded</p>","children":[],"payload":{"lines":"5418,5420"}},{"content":"\n<p data-lines=\"5420,5421\">List Files with Tampered Timestamps</p>","children":[],"payload":{"lines":"5420,5422"}},{"content":"\n<p data-lines=\"5422,5423\">Find File by Path</p>","children":[],"payload":{"lines":"5422,5424"}},{"content":"\n<p data-lines=\"5424,5425\">Find File by Metadata</p>","children":[],"payload":{"lines":"5424,5426"}},{"content":"\n<p data-lines=\"5426,5427\">Find File by Hash</p>","children":[],"payload":{"lines":"5426,5428"}},{"content":"\n<p data-lines=\"5428,5429\">Find File by Format</p>","children":[],"payload":{"lines":"5428,5430"}},{"content":"\n<p data-lines=\"5430,5431\">Find File by Content Pattern</p>","children":[],"payload":{"lines":"5430,5432"}},{"content":"\n<p data-lines=\"5432,5433\">Analyse File Hash</p>","children":[],"payload":{"lines":"5432,5434"}},{"content":"\n<p data-lines=\"5434,5435\">Analyse Windows PE</p>","children":[],"payload":{"lines":"5434,5436"}},{"content":"\n<p data-lines=\"5436,5437\">Analyse Macos Macho</p>","children":[],"payload":{"lines":"5436,5438"}},{"content":"\n<p data-lines=\"5438,5439\">Analyse Unix ELF</p>","children":[],"payload":{"lines":"5438,5440"}},{"content":"\n<p data-lines=\"5440,5441\">Analyse MS Office File</p>","children":[],"payload":{"lines":"5440,5442"}},{"content":"\n<p data-lines=\"5442,5443\">Analyse Script</p>","children":[],"payload":{"lines":"5442,5444"}},{"content":"\n<p data-lines=\"5444,5445\">Analyse JAR</p>","children":[],"payload":{"lines":"5444,5446"}},{"content":"\n<p data-lines=\"5446,5447\">Analyse Filename</p>","children":[],"payload":{"lines":"5446,5448"}},{"content":"\n<p data-lines=\"5448,5449\">List Processes Executed</p>","children":[],"payload":{"lines":"5448,5450"}},{"content":"\n<p data-lines=\"5450,5451\">Find Process by Executable Path</p>","children":[],"payload":{"lines":"5450,5452"}},{"content":"\n<p data-lines=\"5452,5453\">Find Process by Executable Metadata</p>","children":[],"payload":{"lines":"5452,5454"}},{"content":"\n<p data-lines=\"5454,5455\">Find Process by Executable Hash</p>","children":[],"payload":{"lines":"5454,5456"}},{"content":"\n<p data-lines=\"5456,5457\">Find Process by Executable Format</p>","children":[],"payload":{"lines":"5456,5458"}},{"content":"\n<p data-lines=\"5458,5459\">Find Process by Executable Content Pattern</p>","children":[],"payload":{"lines":"5458,5460"}},{"content":"\n<p data-lines=\"5460,5461\">List Registry Keys Modified</p>","children":[],"payload":{"lines":"5460,5462"}},{"content":"\n<p data-lines=\"5462,5463\">List Registry kKeys Deleted</p>","children":[],"payload":{"lines":"5462,5464"}},{"content":"\n<p data-lines=\"5464,5465\">List Registry Keys Accessed</p>","children":[],"payload":{"lines":"5464,5466"}},{"content":"\n<p data-lines=\"5466,5467\">List Registry Keys Created</p>","children":[],"payload":{"lines":"5466,5468"}},{"content":"\n<p data-lines=\"5468,5469\">List Services Created</p>","children":[],"payload":{"lines":"5468,5470"}},{"content":"\n<p data-lines=\"5470,5471\">List Services Modified</p>","children":[],"payload":{"lines":"5470,5472"}},{"content":"\n<p data-lines=\"5472,5473\">List Services Deleted</p>","children":[],"payload":{"lines":"5472,5474"}},{"content":"\n<p data-lines=\"5474,5475\">Analyse Registry Key</p>","children":[],"payload":{"lines":"5474,5476"}},{"content":"\n<p data-lines=\"5476,5477\">List Users Authenticated</p>","children":[],"payload":{"lines":"5476,5478"}},{"content":"\n<p data-lines=\"5478,5479\">List User Accounts</p>","children":[],"payload":{"lines":"5478,5480"}}],"payload":{"lines":"5356,5480"}},{"content":"\n<p data-lines=\"5480,5481\">Containment</p>","children":[{"content":"\n<p data-lines=\"5482,5483\">Patch Vulnerability</p>","children":[],"payload":{"lines":"5482,5484"}},{"content":"\n<p data-lines=\"5484,5485\">Block External IP Address</p>","children":[],"payload":{"lines":"5484,5486"}},{"content":"\n<p data-lines=\"5486,5487\">Block Internal IP Address</p>","children":[],"payload":{"lines":"5486,5488"}},{"content":"\n<p data-lines=\"5488,5489\">Block External Domain</p>","children":[],"payload":{"lines":"5488,5490"}},{"content":"\n<p data-lines=\"5490,5491\">Block Internal Domain</p>","children":[],"payload":{"lines":"5490,5492"}},{"content":"\n<p data-lines=\"5492,5493\">Block External URL</p>","children":[],"payload":{"lines":"5492,5494"}},{"content":"\n<p data-lines=\"5494,5495\">Block Internal URL</p>","children":[],"payload":{"lines":"5494,5496"}},{"content":"\n<p data-lines=\"5496,5497\">Block Port External Communication</p>","children":[],"payload":{"lines":"5496,5498"}},{"content":"\n<p data-lines=\"5498,5499\">Block Port Internal Communication</p>","children":[],"payload":{"lines":"5498,5500"}},{"content":"\n<p data-lines=\"5500,5501\">Block User External Communication</p>","children":[],"payload":{"lines":"5500,5502"}},{"content":"\n<p data-lines=\"5502,5503\">Block User Internal Communication</p>","children":[],"payload":{"lines":"5502,5504"}},{"content":"\n<p data-lines=\"5504,5505\">Block Data Transferring by Content Pattern</p>","children":[],"payload":{"lines":"5504,5506"}},{"content":"\n<p data-lines=\"5506,5507\">Block Domain on Email</p>","children":[],"payload":{"lines":"5506,5508"}},{"content":"\n<p data-lines=\"5508,5509\">Block Sender on Email</p>","children":[],"payload":{"lines":"5508,5510"}},{"content":"\n<p data-lines=\"5510,5511\">Quarantine Email Message</p>","children":[],"payload":{"lines":"5510,5512"}},{"content":"\n<p data-lines=\"5512,5513\">Quarantine File by Format</p>","children":[],"payload":{"lines":"5512,5514"}},{"content":"\n<p data-lines=\"5514,5515\">Quarantine File by Hash</p>","children":[],"payload":{"lines":"5514,5516"}},{"content":"\n<p data-lines=\"5516,5517\">Quarantine File by Path</p>","children":[],"payload":{"lines":"5516,5518"}},{"content":"\n<p data-lines=\"5518,5519\">Quarantine File by Content Pattern</p>","children":[],"payload":{"lines":"5518,5520"}},{"content":"\n<p data-lines=\"5520,5521\">Block Process by Executable Path</p>","children":[],"payload":{"lines":"5520,5522"}},{"content":"\n<p data-lines=\"5522,5523\">Block Process by Executable Metadata</p>","children":[],"payload":{"lines":"5522,5524"}},{"content":"\n<p data-lines=\"5524,5525\">Block Process by Executable Hash</p>","children":[],"payload":{"lines":"5524,5526"}},{"content":"\n<p data-lines=\"5526,5527\">Block Process by Executable Format</p>","children":[],"payload":{"lines":"5526,5528"}},{"content":"\n<p data-lines=\"5528,5529\">Block Process by Executable Content Pattern</p>","children":[],"payload":{"lines":"5528,5530"}},{"content":"\n<p data-lines=\"5530,5531\">Disable System Service</p>","children":[],"payload":{"lines":"5530,5532"}},{"content":"\n<p data-lines=\"5532,5533\">Lock User Account</p>","children":[],"payload":{"lines":"5532,5534"}}],"payload":{"lines":"5480,5534"}},{"content":"\n<p data-lines=\"5534,5535\">Eradication</p>","children":[{"content":"\n<p data-lines=\"5536,5537\">Report Incident to External Companies</p>","children":[],"payload":{"lines":"5536,5538"}},{"content":"\n<p data-lines=\"5538,5539\">Remove Rogue Network Device</p>","children":[],"payload":{"lines":"5538,5540"}},{"content":"\n<p data-lines=\"5540,5541\">Delete Email Message</p>","children":[],"payload":{"lines":"5540,5542"}},{"content":"\n<p data-lines=\"5542,5543\">Remove File</p>","children":[],"payload":{"lines":"5542,5544"}},{"content":"\n<p data-lines=\"5544,5545\">Remove Registry Key</p>","children":[],"payload":{"lines":"5544,5546"}},{"content":"\n<p data-lines=\"5546,5547\">Remove Service</p>","children":[],"payload":{"lines":"5546,5548"}},{"content":"\n<p data-lines=\"5548,5549\">Revoke Authentication Credentials</p>","children":[],"payload":{"lines":"5548,5550"}},{"content":"\n<p data-lines=\"5550,5551\">Remove User Account</p>","children":[],"payload":{"lines":"5550,5552"}}],"payload":{"lines":"5534,5552"}},{"content":"\n<p data-lines=\"5552,5553\">Recovery</p>","children":[{"content":"\n<p data-lines=\"5554,5555\">Reinstall Host From Golden Image</p>","children":[],"payload":{"lines":"5554,5556"}},{"content":"\n<p data-lines=\"5556,5557\">Restore Data From Backup</p>","children":[],"payload":{"lines":"5556,5558"}},{"content":"\n<p data-lines=\"5558,5559\">Unblock Blocked IP</p>","children":[],"payload":{"lines":"5558,5560"}},{"content":"\n<p data-lines=\"5560,5561\">Unblock Blocked Domain</p>","children":[],"payload":{"lines":"5560,5562"}},{"content":"\n<p data-lines=\"5562,5563\">Unblock Blocked URL</p>","children":[],"payload":{"lines":"5562,5564"}},{"content":"\n<p data-lines=\"5564,5565\">Unblock Blocked Port</p>","children":[],"payload":{"lines":"5564,5566"}},{"content":"\n<p data-lines=\"5566,5567\">Unblock Blocked User</p>","children":[],"payload":{"lines":"5566,5568"}},{"content":"\n<p data-lines=\"5568,5569\">Unblock Domain on Email</p>","children":[],"payload":{"lines":"5568,5570"}},{"content":"\n<p data-lines=\"5570,5571\">Unblock Sender on Email</p>","children":[],"payload":{"lines":"5570,5572"}},{"content":"\n<p data-lines=\"5572,5573\">Restore Quarantined Email Message</p>","children":[],"payload":{"lines":"5572,5574"}},{"content":"\n<p data-lines=\"5574,5575\">Restore Quarantined File</p>","children":[],"payload":{"lines":"5574,5576"}},{"content":"\n<p data-lines=\"5576,5577\">Unblock Blocked Process</p>","children":[],"payload":{"lines":"5576,5578"}},{"content":"\n<p data-lines=\"5578,5579\">Enable Disabled Service</p>","children":[],"payload":{"lines":"5578,5580"}},{"content":"\n<p data-lines=\"5580,5581\">Unlock Locked User Account</p>","children":[],"payload":{"lines":"5580,5582"}}],"payload":{"lines":"5552,5582"}}],"payload":{"lines":"5146,5582"}},{"content":"\n<p data-lines=\"5582,5583\">Incident Detection</p>","children":[{"content":"\n<p data-lines=\"5584,5585\">How an Incident can be Detected</p>","children":[],"payload":{"lines":"5584,5586"}},{"content":"\n<p data-lines=\"5586,5587\">How to Verify a Detected Incident</p>","children":[],"payload":{"lines":"5586,5588"}}],"payload":{"lines":"5582,5588"}},{"content":"\n<p data-lines=\"5588,5589\">Evidence Acquisition</p>","children":[{"content":"\n<p data-lines=\"5590,5591\">Digital Evidence in a Forensically Sound Environment</p>","children":[],"payload":{"lines":"5590,5592"}},{"content":"\n<p data-lines=\"5592,5593\">Difference Between Image and Triage Collection</p>","children":[],"payload":{"lines":"5592,5594"}}],"payload":{"lines":"5588,5594"}},{"content":"\n<p data-lines=\"5594,5595\">Memory Analysis</p>","children":[{"content":"Volatility Framework","children":[],"payload":{"lines":"5596,5598"}}],"payload":{"lines":"5594,5598"}},{"content":"\n<p data-lines=\"5598,5599\">Log File Analysis</p>","children":[{"content":"ELK Stack for Log File Analysis","children":[],"payload":{"lines":"5600,5602"}}],"payload":{"lines":"5598,5602"}},{"content":"\n<p data-lines=\"5602,5603\">Network Analysis</p>","children":[{"content":"Dump Network Traffic for Analysis","children":[],"payload":{"lines":"5604,5606"}}],"payload":{"lines":"5602,5606"}},{"content":"\n<p data-lines=\"5606,5607\">Cyber Threat Intelligence</p>","children":[{"content":"\n<p data-lines=\"5608,5609\">What is an IOC</p>","children":[],"payload":{"lines":"5608,5610"}},{"content":"\n<p data-lines=\"5610,5611\">IOC Scanning in the IR Process</p>","children":[],"payload":{"lines":"5610,5612"}},{"content":"\n<p data-lines=\"5612,5613\">The IOC Scanning Cycle</p>","children":[],"payload":{"lines":"5612,5614"}},{"content":"\n<p data-lines=\"5614,5615\">IOC Sharing Platform</p>","children":[],"payload":{"lines":"5614,5616"}},{"content":"\n<p data-lines=\"5616,5617\">Write YARA Rules</p>","children":[],"payload":{"lines":"5616,5618"}},{"content":"\n<p data-lines=\"5618,5619\">YARA rules for Detect Malicious Files</p>","children":[],"payload":{"lines":"5618,5620"}}],"payload":{"lines":"5606,5620"}}],"payload":{"lines":"5134,5620"}}],"payload":{"lines":"5122,5620"}},{"content":"\n<p data-lines=\"5620,5621\">Threat Intelligence</p>","children":[{"content":"\n<p data-lines=\"5622,5623\">Prerequisites</p>","children":[{"content":"\n<p data-lines=\"5624,5625\">Basics of Network</p>","children":[],"payload":{"lines":"5624,5626"}},{"content":"\n<p data-lines=\"5626,5627\">Basics of Linux</p>","children":[],"payload":{"lines":"5626,5628"}},{"content":"\n<p data-lines=\"5628,5629\">Professional Python</p>","children":[],"payload":{"lines":"5628,5630"}},{"content":"\n<p data-lines=\"5630,5631\">Professional Powershell</p>","children":[],"payload":{"lines":"5630,5632"}}],"payload":{"lines":"5622,5632"}},{"content":"\n<p data-lines=\"5632,5633\">Syllabus</p>","children":[{"content":"\n<p data-lines=\"5634,5635\">What is Threat Intelligence</p>","children":[{"content":"\n<p data-lines=\"5636,5637\">Operational Threat Intelligence</p>","children":[],"payload":{"lines":"5636,5638"}},{"content":"\n<p data-lines=\"5638,5639\">Strategic Threat Intelligence</p>","children":[],"payload":{"lines":"5638,5640"}},{"content":"\n<p data-lines=\"5640,5641\">Role of Threat Data Feeds</p>","children":[],"payload":{"lines":"5640,5642"}},{"content":"\n<p data-lines=\"5642,5643\">Role of Private Channels and the Dark Web</p>","children":[],"payload":{"lines":"5642,5644"}}],"payload":{"lines":"5634,5644"}},{"content":"\n<p data-lines=\"5644,5645\">Lifecycle</p>","children":[{"content":"\n<p data-lines=\"5646,5647\">Direction</p>","children":[],"payload":{"lines":"5646,5648"}},{"content":"\n<p data-lines=\"5648,5649\">Collection</p>","children":[],"payload":{"lines":"5648,5650"}},{"content":"\n<p data-lines=\"5650,5651\">Processing</p>","children":[],"payload":{"lines":"5650,5652"}},{"content":"\n<p data-lines=\"5652,5653\">Analysis</p>","children":[],"payload":{"lines":"5652,5654"}},{"content":"\n<p data-lines=\"5654,5655\">Dissemination</p>","children":[],"payload":{"lines":"5654,5656"}},{"content":"\n<p data-lines=\"5656,5657\">Feedback</p>","children":[],"payload":{"lines":"5656,5658"}}],"payload":{"lines":"5644,5658"}},{"content":"\n<p data-lines=\"5658,5659\">Security Operations</p>","children":[{"content":"\n<p data-lines=\"5660,5661\">Responsibilities of the SOC Team</p>","children":[],"payload":{"lines":"5660,5662"}},{"content":"\n<p data-lines=\"5662,5663\">The Overwhelming Volume of Alerts</p>","children":[],"payload":{"lines":"5662,5664"}},{"content":"\n<p data-lines=\"5664,5665\">Context Is King</p>","children":[],"payload":{"lines":"5664,5666"}},{"content":"\n<p data-lines=\"5666,5667\">Improving the \"Time to No\"</p>","children":[],"payload":{"lines":"5666,5668"}},{"content":"\n<p data-lines=\"5668,5669\">Beyond Triage</p>","children":[],"payload":{"lines":"5668,5670"}}],"payload":{"lines":"5658,5670"}},{"content":"\n<p data-lines=\"5670,5671\">Incident Response</p>","children":[{"content":"\n<p data-lines=\"5672,5673\">Minimizing Reactivity</p>","children":[],"payload":{"lines":"5672,5674"}},{"content":"\n<p data-lines=\"5674,5675\">Strengthening Incident Response</p>","children":[],"payload":{"lines":"5674,5676"}},{"content":"\n<p data-lines=\"5676,5677\">Threat Intelligence in Action</p>","children":[],"payload":{"lines":"5676,5678"}},{"content":"\n<p data-lines=\"5678,5679\">Essential Characteristics</p>","children":[],"payload":{"lines":"5678,5680"}}],"payload":{"lines":"5670,5680"}},{"content":"\n<p data-lines=\"5680,5681\">Vulnerability Management</p>","children":[{"content":"\n<p data-lines=\"5682,5683\">Vulnerability Problem by the Numbers</p>","children":[],"payload":{"lines":"5682,5684"}},{"content":"\n<p data-lines=\"5684,5685\">Assess Risk Based on Exploitability</p>","children":[],"payload":{"lines":"5684,5686"}},{"content":"\n<p data-lines=\"5686,5687\">Genesis of Threat Intelligence</p>","children":[],"payload":{"lines":"5686,5688"}},{"content":"\n<p data-lines=\"5688,5689\">Threat Intelligence and Real Risk</p>","children":[],"payload":{"lines":"5688,5690"}},{"content":"\n<p data-lines=\"5690,5691\">Cross-Referencing Intelligence</p>","children":[],"payload":{"lines":"5690,5692"}}],"payload":{"lines":"5680,5692"}},{"content":"\n<p data-lines=\"5692,5693\">Security Leaders</p>","children":[{"content":"\n<p data-lines=\"5694,5695\">Risk Management</p>","children":[],"payload":{"lines":"5694,5696"}},{"content":"\n<p data-lines=\"5696,5697\">Mitigation</p>","children":[],"payload":{"lines":"5696,5698"}},{"content":"\n<p data-lines=\"5698,5699\">Investment</p>","children":[],"payload":{"lines":"5698,5700"}},{"content":"\n<p data-lines=\"5700,5701\">Communication</p>","children":[],"payload":{"lines":"5700,5702"}},{"content":"\n<p data-lines=\"5702,5703\">Supporting Security Leaders</p>","children":[],"payload":{"lines":"5702,5704"}},{"content":"\n<p data-lines=\"5704,5705\">The Security Skills Gap</p>","children":[],"payload":{"lines":"5704,5706"}},{"content":"\n<p data-lines=\"5706,5707\">Intelligence to Manage Better</p>","children":[],"payload":{"lines":"5706,5708"}}],"payload":{"lines":"5692,5708"}},{"content":"\n<p data-lines=\"5708,5709\">Risk Analysis</p>","children":[{"content":"\n<p data-lines=\"5710,5711\">FAIR Risk Model</p>","children":[],"payload":{"lines":"5710,5712"}},{"content":"\n<p data-lines=\"5712,5713\">Threat Probabilities</p>","children":[],"payload":{"lines":"5712,5714"}},{"content":"\n<p data-lines=\"5714,5715\">Cost of Attacks</p>","children":[],"payload":{"lines":"5714,5716"}}],"payload":{"lines":"5708,5716"}},{"content":"\n<p data-lines=\"5716,5717\">Fraud Prevention</p>","children":[{"content":"\n<p data-lines=\"5718,5719\">Criminal Communities</p>","children":[],"payload":{"lines":"5718,5720"}},{"content":"\n<p data-lines=\"5720,5721\">Connecting the Dots</p>","children":[],"payload":{"lines":"5720,5722"}}],"payload":{"lines":"5716,5722"}},{"content":"\n<p data-lines=\"5722,5723\">Reducing Third-Party Risk</p>","children":[{"content":"\n<p data-lines=\"5724,5725\">Third-Party Risk Looms Large</p>","children":[],"payload":{"lines":"5724,5726"}},{"content":"\n<p data-lines=\"5726,5727\">Traditional Risk Assessments Fall Short</p>","children":[],"payload":{"lines":"5726,5728"}},{"content":"\n<p data-lines=\"5728,5729\">Automation and machine learning</p>","children":[],"payload":{"lines":"5728,5730"}}],"payload":{"lines":"5722,5730"}},{"content":"\n<p data-lines=\"5730,5731\">Digital Risk Protection</p>","children":[{"content":"\n<p data-lines=\"5732,5733\">Being Online Is Being at Risk</p>","children":[],"payload":{"lines":"5732,5734"}},{"content":"\n<p data-lines=\"5734,5735\">Types of Digital Risk</p>","children":[],"payload":{"lines":"5734,5736"}},{"content":"\n<p data-lines=\"5736,5737\">Breaches on the Web</p>","children":[],"payload":{"lines":"5736,5738"}},{"content":"\n<p data-lines=\"5738,5739\">Brand Impersonation and Abuse</p>","children":[],"payload":{"lines":"5738,5740"}},{"content":"\n<p data-lines=\"5740,5741\">Critical Qualities</p>","children":[],"payload":{"lines":"5740,5742"}}],"payload":{"lines":"5730,5742"}},{"content":"\n<p data-lines=\"5742,5743\">Analytical Frameworks</p>","children":[{"content":"\n<p data-lines=\"5744,5745\">Lockheed Martin Cyber Kill Chain</p>","children":[],"payload":{"lines":"5744,5746"}},{"content":"\n<p data-lines=\"5746,5747\">Diamond Model</p>","children":[],"payload":{"lines":"5746,5748"}},{"content":"\n<p data-lines=\"5748,5749\">MITRE ATT&CK™ Framework</p>","children":[],"payload":{"lines":"5748,5750"}}],"payload":{"lines":"5742,5750"}}],"payload":{"lines":"5632,5750"}}],"payload":{"lines":"5620,5750"}}],"payload":{"lines":"4527,4528"}},{"content":"Blue Team","children":[{"content":"\n<p data-lines=\"5752,5753\">Prerequisites</p>","children":[{"content":"\n<p data-lines=\"5754,5755\">Basics of Network</p>","children":[],"payload":{"lines":"5754,5756"}},{"content":"\n<p data-lines=\"5756,5757\">Basics of Linux</p>","children":[],"payload":{"lines":"5756,5758"}},{"content":"\n<p data-lines=\"5758,5759\">Basics of C-Sharp</p>","children":[],"payload":{"lines":"5758,5760"}},{"content":"\n<p data-lines=\"5760,5761\">Professional Python</p>","children":[],"payload":{"lines":"5760,5762"}},{"content":"\n<p data-lines=\"5762,5763\">Professional Powershell</p>","children":[],"payload":{"lines":"5762,5764"}}],"payload":{"lines":"5752,5764"}},{"content":"\n<p data-lines=\"5764,5765\">Syllabus</p>","children":[{"content":"\n<p data-lines=\"5766,5767\">Harden</p>","children":[{"content":"\n<p data-lines=\"5768,5769\">Application Hardening</p>","children":[{"content":"\n<p data-lines=\"5770,5771\">Application Configuration Hardening</p>","children":[],"payload":{"lines":"5770,5772"}},{"content":"\n<p data-lines=\"5772,5773\">Dead Code Elimination</p>","children":[],"payload":{"lines":"5772,5774"}},{"content":"\n<p data-lines=\"5774,5775\">Exception Handler Pointer Validation</p>","children":[],"payload":{"lines":"5774,5776"}},{"content":"\n<p data-lines=\"5776,5777\">Pointer Authentication</p>","children":[],"payload":{"lines":"5776,5778"}},{"content":"\n<p data-lines=\"5778,5779\">Process Segment Execution Prevention</p>","children":[],"payload":{"lines":"5778,5780"}},{"content":"\n<p data-lines=\"5780,5781\">Segment Address Offset Randomization</p>","children":[],"payload":{"lines":"5780,5782"}},{"content":"\n<p data-lines=\"5782,5783\">Stack Frame Canary Validation</p>","children":[],"payload":{"lines":"5782,5784"}}],"payload":{"lines":"5768,5784"}},{"content":"\n<p data-lines=\"5784,5785\">Credential Hardening</p>","children":[{"content":"\n<p data-lines=\"5786,5787\">Biometric Authentication</p>","children":[],"payload":{"lines":"5786,5788"}},{"content":"\n<p data-lines=\"5788,5789\">Certificate Pinning</p>","children":[],"payload":{"lines":"5788,5790"}},{"content":"\n<p data-lines=\"5790,5791\">Credential Rotation</p>","children":[],"payload":{"lines":"5790,5792"}},{"content":"\n<p data-lines=\"5792,5793\">Credential Transmission Scoping</p>","children":[],"payload":{"lines":"5792,5794"}},{"content":"\n<p data-lines=\"5794,5795\">Domain Trust Policy</p>","children":[],"payload":{"lines":"5794,5796"}},{"content":"\n<p data-lines=\"5796,5797\">Multi-factor Authentication</p>","children":[],"payload":{"lines":"5796,5798"}},{"content":"\n<p data-lines=\"5798,5799\">One-time Password</p>","children":[],"payload":{"lines":"5798,5800"}},{"content":"\n<p data-lines=\"5800,5801\">Strong Password Policy</p>","children":[],"payload":{"lines":"5800,5802"}},{"content":"\n<p data-lines=\"5802,5803\">User Account Permissions</p>","children":[],"payload":{"lines":"5802,5804"}}],"payload":{"lines":"5784,5804"}},{"content":"\n<p data-lines=\"5804,5805\">Message Hardening</p>","children":[{"content":"\n<p data-lines=\"5806,5807\">Message Authentication</p>","children":[],"payload":{"lines":"5806,5808"}},{"content":"\n<p data-lines=\"5808,5809\">Message Encryption</p>","children":[],"payload":{"lines":"5808,5810"}},{"content":"\n<p data-lines=\"5810,5811\">Transfer Agent Authentication</p>","children":[],"payload":{"lines":"5810,5812"}}],"payload":{"lines":"5804,5812"}},{"content":"\n<p data-lines=\"5812,5813\">Platform Hardening</p>","children":[{"content":"\n<p data-lines=\"5814,5815\">Bootloader Authentication</p>","children":[],"payload":{"lines":"5814,5816"}},{"content":"\n<p data-lines=\"5816,5817\">Disk Encryption</p>","children":[],"payload":{"lines":"5816,5818"}},{"content":"\n<p data-lines=\"5818,5819\">Driver Load Integrity Checking</p>","children":[],"payload":{"lines":"5818,5820"}},{"content":"\n<p data-lines=\"5820,5821\">File Encryption</p>","children":[],"payload":{"lines":"5820,5822"}},{"content":"\n<p data-lines=\"5822,5823\">Local File Permissions</p>","children":[],"payload":{"lines":"5822,5824"}},{"content":"\n<p data-lines=\"5824,5825\">RF Shielding</p>","children":[],"payload":{"lines":"5824,5826"}},{"content":"\n<p data-lines=\"5826,5827\">Software Update</p>","children":[],"payload":{"lines":"5826,5828"}},{"content":"\n<p data-lines=\"5828,5829\">System Configuration Permissions</p>","children":[],"payload":{"lines":"5828,5830"}},{"content":"\n<p data-lines=\"5830,5831\">TPM Boot Integrity</p>","children":[],"payload":{"lines":"5830,5832"}}],"payload":{"lines":"5812,5832"}}],"payload":{"lines":"5766,5832"}},{"content":"\n<p data-lines=\"5832,5833\">Detect</p>","children":[{"content":"\n<p data-lines=\"5834,5835\">File Analysis</p>","children":[{"content":"\n<p data-lines=\"5836,5837\">Dynamic Analysis</p>","children":[],"payload":{"lines":"5836,5838"}},{"content":"\n<p data-lines=\"5838,5839\">Emulated File Analysis</p>","children":[],"payload":{"lines":"5838,5840"}},{"content":"\n<p data-lines=\"5840,5841\">File Content Rules</p>","children":[{"content":"File Content Rules","children":[],"payload":{"lines":"5842,5844"}}],"payload":{"lines":"5840,5844"}},{"content":"\n<p data-lines=\"5844,5845\">File Hashing</p>","children":[],"payload":{"lines":"5844,5846"}}],"payload":{"lines":"5834,5846"}},{"content":"\n<p data-lines=\"5846,5847\">Identifier Analysis</p>","children":[{"content":"\n<p data-lines=\"5848,5849\">Homoglyph Detection</p>","children":[],"payload":{"lines":"5848,5850"}},{"content":"\n<p data-lines=\"5850,5851\">Identifier Activity Analysis</p>","children":[],"payload":{"lines":"5850,5852"}},{"content":"\n<p data-lines=\"5852,5853\">Identifier Reputation Analysis</p>","children":[{"content":"\n<p data-lines=\"5854,5855\">Domain Name Reputation Analysis</p>","children":[],"payload":{"lines":"5854,5856"}},{"content":"\n<p data-lines=\"5856,5857\">File Hash Reputation Analysis</p>","children":[],"payload":{"lines":"5856,5858"}},{"content":"\n<p data-lines=\"5858,5859\">IP Reputation Analysis</p>","children":[],"payload":{"lines":"5858,5860"}},{"content":"\n<p data-lines=\"5860,5861\">URL Reputation Analysis</p>","children":[],"payload":{"lines":"5860,5862"}}],"payload":{"lines":"5852,5862"}},{"content":"\n<p data-lines=\"5862,5863\">URL Analysis</p>","children":[],"payload":{"lines":"5862,5864"}}],"payload":{"lines":"5846,5864"}},{"content":"\n<p data-lines=\"5864,5865\">Message Analysis</p>","children":[{"content":"\n<p data-lines=\"5866,5867\">Sender MTA Reputation Analysis</p>","children":[],"payload":{"lines":"5866,5868"}},{"content":"\n<p data-lines=\"5868,5869\">Sender Reputation Analysis</p>","children":[],"payload":{"lines":"5868,5870"}}],"payload":{"lines":"5864,5870"}},{"content":"\n<p data-lines=\"5870,5871\">Network Traffic Analysis</p>","children":[{"content":"\n<p data-lines=\"5872,5873\">Administrative Network Activity Analysis</p>","children":[],"payload":{"lines":"5872,5874"}},{"content":"\n<p data-lines=\"5874,5875\">Byte Sequence Emulation</p>","children":[],"payload":{"lines":"5874,5876"}},{"content":"\n<p data-lines=\"5876,5877\">Certificate Analysis</p>","children":[{"content":"\n<p data-lines=\"5878,5879\">Active Certificate Analysis</p>","children":[],"payload":{"lines":"5878,5880"}},{"content":"\n<p data-lines=\"5880,5881\">Passive Certificate Analysis</p>","children":[],"payload":{"lines":"5880,5882"}}],"payload":{"lines":"5876,5882"}},{"content":"\n<p data-lines=\"5882,5883\">Client-server Payload Profiling</p>","children":[],"payload":{"lines":"5882,5884"}},{"content":"\n<p data-lines=\"5884,5885\">Connection Attempt Analysis</p>","children":[],"payload":{"lines":"5884,5886"}},{"content":"\n<p data-lines=\"5886,5887\">DNS Traffic Analysis</p>","children":[],"payload":{"lines":"5886,5888"}},{"content":"\n<p data-lines=\"5888,5889\">File Carving</p>","children":[],"payload":{"lines":"5888,5890"}},{"content":"\n<p data-lines=\"5890,5891\">Inbound Session Volume Analysis</p>","children":[],"payload":{"lines":"5890,5892"}},{"content":"\n<p data-lines=\"5892,5893\">IPC Traffic Analysis</p>","children":[],"payload":{"lines":"5892,5894"}},{"content":"\n<p data-lines=\"5894,5895\">Network Traffic Community Deviation</p>","children":[],"payload":{"lines":"5894,5896"}},{"content":"\n<p data-lines=\"5896,5897\">Per Host Download-Upload Ratio Analysis</p>","children":[],"payload":{"lines":"5896,5898"}},{"content":"\n<p data-lines=\"5898,5899\">Protocol Metadata Anomaly Detection</p>","children":[],"payload":{"lines":"5898,5900"}},{"content":"\n<p data-lines=\"5900,5901\">Relay Pattern Analysis</p>","children":[],"payload":{"lines":"5900,5902"}},{"content":"\n<p data-lines=\"5902,5903\">Remote Terminal Session Detection</p>","children":[],"payload":{"lines":"5902,5904"}},{"content":"\n<p data-lines=\"5904,5905\">RPC Traffic Analysis</p>","children":[],"payload":{"lines":"5904,5906"}}],"payload":{"lines":"5870,5906"}},{"content":"\n<p data-lines=\"5906,5907\">Platform Monitoring</p>","children":[{"content":"\n<p data-lines=\"5908,5909\">Firmware Behavior Analysis</p>","children":[],"payload":{"lines":"5908,5910"}},{"content":"\n<p data-lines=\"5910,5911\">Firmware Embedded Monitoring Code</p>","children":[],"payload":{"lines":"5910,5912"}},{"content":"\n<p data-lines=\"5912,5913\">Firmware Verification</p>","children":[{"content":"\n<p data-lines=\"5914,5915\">Peripheral Firmware Verification</p>","children":[],"payload":{"lines":"5914,5916"}},{"content":"\n<p data-lines=\"5916,5917\">System Firmware Verification</p>","children":[],"payload":{"lines":"5916,5918"}}],"payload":{"lines":"5912,5918"}},{"content":"\n<p data-lines=\"5918,5919\">Operating System Monitoring</p>","children":[{"content":"\n<p data-lines=\"5920,5921\">Endpoint Health Beacon</p>","children":[],"payload":{"lines":"5920,5922"}},{"content":"\n<p data-lines=\"5922,5923\">Input Device Analysis</p>","children":[],"payload":{"lines":"5922,5924"}},{"content":"\n<p data-lines=\"5924,5925\">Memory Boundary Tracking</p>","children":[],"payload":{"lines":"5924,5926"}},{"content":"\n<p data-lines=\"5926,5927\">Scheduled Job Analysis</p>","children":[],"payload":{"lines":"5926,5928"}},{"content":"\n<p data-lines=\"5928,5929\">System Daemon Monitoring</p>","children":[],"payload":{"lines":"5928,5930"}},{"content":"\n<p data-lines=\"5930,5931\">System File Analysis</p>","children":[],"payload":{"lines":"5930,5932"}},{"content":"\n<p data-lines=\"5932,5933\">Service Binary Verification</p>","children":[],"payload":{"lines":"5932,5934"}},{"content":"\n<p data-lines=\"5934,5935\">System Init Config Analysis</p>","children":[],"payload":{"lines":"5934,5936"}},{"content":"\n<p data-lines=\"5936,5937\">User Session Init Config Analysis</p>","children":[],"payload":{"lines":"5936,5938"}}],"payload":{"lines":"5918,5938"}}],"payload":{"lines":"5906,5938"}},{"content":"\n<p data-lines=\"5938,5939\">Process Analysis</p>","children":[{"content":"\n<p data-lines=\"5940,5941\">Database Query String Analysis</p>","children":[],"payload":{"lines":"5940,5942"}},{"content":"\n<p data-lines=\"5942,5943\">File Access Pattern Analysis</p>","children":[],"payload":{"lines":"5942,5944"}},{"content":"\n<p data-lines=\"5944,5945\">Indirect Branch Call Analysis</p>","children":[],"payload":{"lines":"5944,5946"}},{"content":"\n<p data-lines=\"5946,5947\">Process Code Segment Verification</p>","children":[],"payload":{"lines":"5946,5948"}},{"content":"\n<p data-lines=\"5948,5949\">Process Self-Modification Detection</p>","children":[],"payload":{"lines":"5948,5950"}},{"content":"\n<p data-lines=\"5950,5951\">Process Spawn Analysis</p>","children":[{"content":"Process Lineage Analysis","children":[],"payload":{"lines":"5952,5954"}}],"payload":{"lines":"5950,5954"}},{"content":"\n<p data-lines=\"5954,5955\">Script Execution Analysis</p>","children":[],"payload":{"lines":"5954,5956"}},{"content":"\n<p data-lines=\"5956,5957\">Shadow Stack Comparisons</p>","children":[],"payload":{"lines":"5956,5958"}},{"content":"\n<p data-lines=\"5958,5959\">System Call Analysis</p>","children":[{"content":"File Creation Analysis","children":[],"payload":{"lines":"5960,5962"}}],"payload":{"lines":"5958,5962"}}],"payload":{"lines":"5938,5962"}},{"content":"\n<p data-lines=\"5962,5963\">User Behavior Analysis</p>","children":[{"content":"\n<p data-lines=\"5964,5965\">Authentication Event Thresholding</p>","children":[],"payload":{"lines":"5964,5966"}},{"content":"\n<p data-lines=\"5966,5967\">Authorization Event Thresholding</p>","children":[],"payload":{"lines":"5966,5968"}},{"content":"\n<p data-lines=\"5968,5969\">Credential Compromise Scope Analysis</p>","children":[],"payload":{"lines":"5968,5970"}},{"content":"\n<p data-lines=\"5970,5971\">Domain Account Monitoring</p>","children":[],"payload":{"lines":"5970,5972"}},{"content":"\n<p data-lines=\"5972,5973\">Job Function Access Pattern Analysis</p>","children":[],"payload":{"lines":"5972,5974"}},{"content":"\n<p data-lines=\"5974,5975\">Local Account Monitoring</p>","children":[],"payload":{"lines":"5974,5976"}},{"content":"\n<p data-lines=\"5976,5977\">Resource Access Pattern Analysis</p>","children":[],"payload":{"lines":"5976,5978"}},{"content":"\n<p data-lines=\"5978,5979\">Session Duration Analysis</p>","children":[],"payload":{"lines":"5978,5980"}},{"content":"\n<p data-lines=\"5980,5981\">User Data Transfer Analysis</p>","children":[],"payload":{"lines":"5980,5982"}},{"content":"\n<p data-lines=\"5982,5983\">User Geolocation Logon Pattern Analysis</p>","children":[],"payload":{"lines":"5982,5984"}},{"content":"\n<p data-lines=\"5984,5985\">Web Session Activity Analysis</p>","children":[],"payload":{"lines":"5984,5986"}}],"payload":{"lines":"5962,5986"}}],"payload":{"lines":"5832,5986"}},{"content":"\n<p data-lines=\"5986,5987\">Isolate</p>","children":[{"content":"\n<p data-lines=\"5988,5989\">Execution Isolation</p>","children":[{"content":"\n<p data-lines=\"5990,5991\">Executable Allowlisting</p>","children":[],"payload":{"lines":"5990,5992"}},{"content":"\n<p data-lines=\"5992,5993\">Executable Denylisting</p>","children":[],"payload":{"lines":"5992,5994"}},{"content":"\n<p data-lines=\"5994,5995\">Hardware-based Process Isolation</p>","children":[],"payload":{"lines":"5994,5996"}},{"content":"\n<p data-lines=\"5996,5997\">IO Port Restriction</p>","children":[],"payload":{"lines":"5996,5998"}},{"content":"\n<p data-lines=\"5998,5999\">Kernel-based Process Isolation</p>","children":[{"content":"\n<p data-lines=\"6000,6001\">Mandatory Access Control</p>","children":[],"payload":{"lines":"6000,6002"}},{"content":"\n<p data-lines=\"6002,6003\">System Call Filtering</p>","children":[],"payload":{"lines":"6002,6004"}}],"payload":{"lines":"5998,6004"}}],"payload":{"lines":"5988,6004"}},{"content":"\n<p data-lines=\"6004,6005\">Network Isolation</p>","children":[{"content":"\n<p data-lines=\"6006,6007\">Broadcast Domain Isolation</p>","children":[],"payload":{"lines":"6006,6008"}},{"content":"\n<p data-lines=\"6008,6009\">DNS Allowlisting</p>","children":[],"payload":{"lines":"6008,6010"}},{"content":"\n<p data-lines=\"6010,6011\">DNS Denylisting</p>","children":[{"content":"\n<p data-lines=\"6012,6013\">Forward Resolution Domain Denylisting</p>","children":[],"payload":{"lines":"6012,6014"}},{"content":"\n<p data-lines=\"6014,6015\">Hierarchical Domain Denylisting</p>","children":[],"payload":{"lines":"6014,6016"}},{"content":"\n<p data-lines=\"6016,6017\">Homoglyph Denylisting</p>","children":[],"payload":{"lines":"6016,6018"}},{"content":"\n<p data-lines=\"6018,6019\">Forward Resolution IP Denylisting</p>","children":[],"payload":{"lines":"6018,6020"}},{"content":"\n<p data-lines=\"6020,6021\">Reverse Resolution IP Denylisting</p>","children":[],"payload":{"lines":"6020,6022"}}],"payload":{"lines":"6010,6022"}},{"content":"\n<p data-lines=\"6022,6023\">Encrypted Tunnels</p>","children":[],"payload":{"lines":"6022,6024"}},{"content":"\n<p data-lines=\"6024,6025\">Network Traffic Filtering</p>","children":[{"content":"\n<p data-lines=\"6026,6027\">Inbound Traffic Filtering</p>","children":[],"payload":{"lines":"6026,6028"}},{"content":"\n<p data-lines=\"6028,6029\">Email Filtering</p>","children":[],"payload":{"lines":"6028,6030"}},{"content":"\n<p data-lines=\"6030,6031\">Outbound Traffic Filtering</p>","children":[],"payload":{"lines":"6030,6032"}}],"payload":{"lines":"6024,6032"}}],"payload":{"lines":"6004,6032"}}],"payload":{"lines":"5986,6032"}},{"content":"\n<p data-lines=\"6032,6033\">Deceive</p>","children":[{"content":"\n<p data-lines=\"6034,6035\">Decoy Environment</p>","children":[{"content":"\n<p data-lines=\"6036,6037\">Connected Honeynet</p>","children":[],"payload":{"lines":"6036,6038"}},{"content":"\n<p data-lines=\"6038,6039\">Integrated Honeynet</p>","children":[],"payload":{"lines":"6038,6040"}},{"content":"\n<p data-lines=\"6040,6041\">Standalone Honeynet</p>","children":[],"payload":{"lines":"6040,6042"}}],"payload":{"lines":"6034,6042"}},{"content":"\n<p data-lines=\"6042,6043\">Decoy Object</p>","children":[{"content":"\n<p data-lines=\"6044,6045\">Decoy File</p>","children":[],"payload":{"lines":"6044,6046"}},{"content":"\n<p data-lines=\"6046,6047\">Decoy Network Resource</p>","children":[],"payload":{"lines":"6046,6048"}},{"content":"\n<p data-lines=\"6048,6049\">Decoy Persona</p>","children":[],"payload":{"lines":"6048,6050"}},{"content":"\n<p data-lines=\"6050,6051\">Decoy Public Release</p>","children":[],"payload":{"lines":"6050,6052"}},{"content":"\n<p data-lines=\"6052,6053\">Decoy Session Token</p>","children":[],"payload":{"lines":"6052,6054"}},{"content":"\n<p data-lines=\"6054,6055\">Decoy User Credential</p>","children":[],"payload":{"lines":"6054,6056"}}],"payload":{"lines":"6042,6056"}}],"payload":{"lines":"6032,6056"}},{"content":"\n<p data-lines=\"6056,6057\">Evict</p>","children":[{"content":"\n<p data-lines=\"6058,6059\">Credential Eviction</p>","children":[{"content":"\n<p data-lines=\"6060,6061\">Account Locking</p>","children":[],"payload":{"lines":"6060,6062"}},{"content":"\n<p data-lines=\"6062,6063\">Authentication Cache Invalidation</p>","children":[],"payload":{"lines":"6062,6064"}},{"content":"\n<p data-lines=\"6064,6065\">Credential Revoking</p>","children":[],"payload":{"lines":"6064,6066"}}],"payload":{"lines":"6058,6066"}},{"content":"\n<p data-lines=\"6066,6067\">File Eviction</p>","children":[{"content":"\n<p data-lines=\"6068,6069\">File Removal</p>","children":[{"content":"Email Removal","children":[],"payload":{"lines":"6070,6072"}}],"payload":{"lines":"6068,6072"}}],"payload":{"lines":"6066,6072"}},{"content":"\n<p data-lines=\"6072,6073\">Process Eviction</p>","children":[{"content":"\n<p data-lines=\"6074,6075\">Host Shutdown</p>","children":[{"content":"Host Reboot","children":[],"payload":{"lines":"6076,6078"}}],"payload":{"lines":"6074,6078"}},{"content":"\n<p data-lines=\"6078,6079\">Process Suspension</p>","children":[],"payload":{"lines":"6078,6080"}},{"content":"\n<p data-lines=\"6080,6081\">Process Termination</p>","children":[],"payload":{"lines":"6080,6082"}}],"payload":{"lines":"6072,6082"}}],"payload":{"lines":"6056,6082"}},{"content":"\n<p data-lines=\"6082,6083\">Restore</p>","children":[{"content":"\n<p data-lines=\"6084,6085\">Restore Access</p>","children":[{"content":"\n<p data-lines=\"6086,6087\">Restore Network Access</p>","children":[],"payload":{"lines":"6086,6088"}},{"content":"\n<p data-lines=\"6088,6089\">Restore User Account Access</p>","children":[{"content":"Unlock Account","children":[],"payload":{"lines":"6090,6092"}}],"payload":{"lines":"6088,6092"}}],"payload":{"lines":"6084,6092"}},{"content":"\n<p data-lines=\"6092,6093\">Restore Object</p>","children":[{"content":"\n<p data-lines=\"6094,6095\">Reissue Credential</p>","children":[],"payload":{"lines":"6094,6096"}},{"content":"\n<p data-lines=\"6096,6097\">Restore Configuration</p>","children":[],"payload":{"lines":"6096,6098"}},{"content":"\n<p data-lines=\"6098,6099\">Restore Database</p>","children":[],"payload":{"lines":"6098,6100"}},{"content":"\n<p data-lines=\"6100,6101\">Restore Disk Image</p>","children":[],"payload":{"lines":"6100,6102"}},{"content":"\n<p data-lines=\"6102,6103\">Restore File</p>","children":[{"content":"Restore Email","children":[],"payload":{"lines":"6104,6106"}}],"payload":{"lines":"6102,6106"}},{"content":"\n<p data-lines=\"6106,6107\">Restore Software</p>","children":[],"payload":{"lines":"6106,6108"}}],"payload":{"lines":"6092,6108"}}],"payload":{"lines":"6082,6108"}}],"payload":{"lines":"5764,6108"}}],"payload":{"lines":"5750,5751"}},{"content":"Security Audit","children":[{"content":"\n<p data-lines=\"6110,6111\">Prerequisites</p>","children":[{"content":"\n<p data-lines=\"6112,6113\">Basics of Network</p>","children":[],"payload":{"lines":"6112,6114"}},{"content":"\n<p data-lines=\"6114,6115\">Basics of Linux</p>","children":[],"payload":{"lines":"6114,6116"}},{"content":"\n<p data-lines=\"6116,6117\">Basics of C-Sharp</p>","children":[],"payload":{"lines":"6116,6118"}},{"content":"\n<p data-lines=\"6118,6119\">Professional Python</p>","children":[],"payload":{"lines":"6118,6120"}},{"content":"\n<p data-lines=\"6120,6121\">Professional Powershell</p>","children":[],"payload":{"lines":"6120,6122"}}],"payload":{"lines":"6110,6122"}},{"content":"\n<p data-lines=\"6122,6123\">Syllabus</p>","children":[{"content":"\n<p data-lines=\"6124,6125\">Preliminary Audit Assessment</p>","children":[{"content":"\n<p data-lines=\"6126,6127\">Security Policy and Standards</p>","children":[],"payload":{"lines":"6126,6128"}},{"content":"\n<p data-lines=\"6128,6129\">Organizational and Personal Security</p>","children":[],"payload":{"lines":"6128,6130"}},{"content":"\n<p data-lines=\"6130,6131\">Communication, Operation and Asset Management</p>","children":[],"payload":{"lines":"6130,6132"}},{"content":"\n<p data-lines=\"6132,6133\">Physical and Environmental Security</p>","children":[],"payload":{"lines":"6132,6134"}},{"content":"\n<p data-lines=\"6134,6135\">Access Control and Compliance</p>","children":[],"payload":{"lines":"6134,6136"}},{"content":"\n<p data-lines=\"6136,6137\">IT Systems Development and Maintenance</p>","children":[],"payload":{"lines":"6136,6138"}},{"content":"\n<p data-lines=\"6138,6139\">IT Security Incident Management</p>","children":[],"payload":{"lines":"6138,6140"}},{"content":"\n<p data-lines=\"6140,6141\">Disaster Recovery and Business Continuity Management</p>","children":[],"payload":{"lines":"6140,6142"}},{"content":"\n<p data-lines=\"6142,6143\">Risk Management</p>","children":[],"payload":{"lines":"6142,6144"}}],"payload":{"lines":"6124,6144"}},{"content":"\n<p data-lines=\"6144,6145\">Planning and Preparation</p>","children":[{"content":"\n<p data-lines=\"6146,6147\">Meet with IT Management to Determine Possible Areas of Concern</p>","children":[],"payload":{"lines":"6146,6148"}},{"content":"\n<p data-lines=\"6148,6149\">Review the Current IT Organization Chart</p>","children":[],"payload":{"lines":"6148,6150"}},{"content":"\n<p data-lines=\"6150,6151\">Review Job Descriptions of Data Center Employees</p>","children":[],"payload":{"lines":"6150,6152"}},{"content":"\n<p data-lines=\"6152,6153\">Research all OS, Software Applications, and Data Center Equipment Operating within the Data Center</p>","children":[],"payload":{"lines":"6152,6154"}},{"content":"\n<p data-lines=\"6154,6155\">Review the Company's IT Policies and Procedures</p>","children":[],"payload":{"lines":"6154,6156"}},{"content":"\n<p data-lines=\"6156,6157\">Evaluate the Company's IT Budget and Systems Planning Documentation</p>","children":[],"payload":{"lines":"6156,6158"}},{"content":"\n<p data-lines=\"6158,6159\">Review the Data Center's Disaster Recovery Plan</p>","children":[],"payload":{"lines":"6158,6160"}}],"payload":{"lines":"6144,6160"}},{"content":"\n<p data-lines=\"6160,6161\">Establishing Audit Objectives</p>","children":[{"content":"\n<p data-lines=\"6162,6163\">Personnel Procedures and Responsibilities, Including Systems and Cross-functional Training</p>","children":[],"payload":{"lines":"6162,6164"}},{"content":"\n<p data-lines=\"6164,6165\">Change Management Processes are in Place and Followed by IT and Management Personnel</p>","children":[],"payload":{"lines":"6164,6166"}},{"content":"\n<p data-lines=\"6166,6167\">Appropriate Backup Procedures are in Place to Minimize Downtime and Prevent the Loss of Important Data</p>","children":[],"payload":{"lines":"6166,6168"}},{"content":"\n<p data-lines=\"6168,6169\">The Data Center has Adequate Physical Security Controls to Prevent Unauthorized Access to the Data Center</p>","children":[],"payload":{"lines":"6168,6170"}},{"content":"\n<p data-lines=\"6170,6171\">Adequate Environmental Controls are in Place to Ensure Equipment is Protected from Fire and Flooding</p>","children":[],"payload":{"lines":"6170,6172"}}],"payload":{"lines":"6160,6172"}},{"content":"\n<p data-lines=\"6172,6173\">Performing the Review</p>","children":[{"content":"\n<p data-lines=\"6174,6175\">Data Center Personnel</p>","children":[],"payload":{"lines":"6174,6176"}},{"content":"\n<p data-lines=\"6176,6177\">Equipment</p>","children":[],"payload":{"lines":"6176,6178"}},{"content":"\n<p data-lines=\"6178,6179\">Policies and Procedures</p>","children":[],"payload":{"lines":"6178,6180"}},{"content":"\n<p data-lines=\"6180,6181\">Physical Security/Environmental Controls</p>","children":[],"payload":{"lines":"6180,6182"}},{"content":"\n<p data-lines=\"6182,6183\">Backup Procedures</p>","children":[],"payload":{"lines":"6182,6184"}}],"payload":{"lines":"6172,6184"}},{"content":"\n<p data-lines=\"6184,6185\">Preparing the Audit Report</p>","children":[{"content":"\n<p data-lines=\"6186,6187\">After the Audit Examination is Completed, the Audit Findings and Suggestions</p>","children":[],"payload":{"lines":"6186,6188"}},{"content":"\n<p data-lines=\"6188,6189\">Writing a Report After such a Meeting and Describing</p>","children":[],"payload":{"lines":"6188,6190"}}],"payload":{"lines":"6184,6190"}},{"content":"\n<p data-lines=\"6190,6191\">Issuing the Review Report</p>","children":[{"content":"\n<p data-lines=\"6192,6193\">The Auditors’ Procedures and Findings</p>","children":[],"payload":{"lines":"6192,6194"}},{"content":"\n<p data-lines=\"6194,6195\">The Auditors’ Recommendations</p>","children":[],"payload":{"lines":"6194,6196"}},{"content":"\n<p data-lines=\"6196,6197\">Objective, Scope, and Methodologies</p>","children":[],"payload":{"lines":"6196,6198"}},{"content":"\n<p data-lines=\"6198,6199\">Overview/Conclusions</p>","children":[],"payload":{"lines":"6198,6199"}}],"payload":{"lines":"6190,6199"}}],"payload":{"lines":"6122,6199"}}],"payload":{"lines":"6108,6109"}}],"payload":{"lines":"4525,4526"}}],"payload":{"lines":"1,2"}},{"initialExpandLevel":3})</script>
</body>
</html>