academy.intel-ops.io Open in urlscan Pro
2606:4700::6812:1f85  Public Scan

URL: https://academy.intel-ops.io/courses/hunting-adversary-infra
Submission: On August 12 via manual from PH — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Skip to main content


HUNTING ADVERSARY INFRASTRUCTURE

Toggle menu Menu
 * All Products
 * 
 * Sign In


HUNTING ADVERSARY INFRASTRUCTURE

Interested in this course? Email us at contact@intel-ops.io


COURSE CURRICULUM


 1.  INTRODUCTION
     
      a. Course Structure & Syllabus
     
      b. Disclaimer


 2.  INFRASTRUCTURE HUNTING
     
      a. What is Infrastructure Hunting?


 3.  TOOLING
     
      a. Internet Search Engines
     
      b. Which Search Engines do you use?
     
      c. Maltego


 4.  WHERE TO START?
     
      a. Where to Start?
     
      b. Operational Security and Data Management


 5.  IOC PIVOTING
     
      a. Pivoting with SSH
     
      b. HTTP Headers
     
      c. Pivoting with HTTP Headers


 6.  INFRASTRUCTURE HUNTING WITHOUT AN IOC
     
      a. Threat Hunting Hypothesis


 7.  TRACKING CRIMINAL GROUPS
     
      a. Hunting for Rhysida’s PortStarter C2
     
      b. Tracking the LockBit affiliates that compromised Foxsemicon
     
      c. Hunting Scattered Spider Infrastructure


 8.  TRACKING NATION STATE ACTORS: RUSSIA
     
      a. Hunting COLDRIVER/Callisto's SPICA Backdoor
     
      b. Hunting APT28/Fancy Bear(GRU UNIT26165)


 9.  TRACKING NATION STATE ACTORS: NORTH KOREA
     
      a. Hunting Lazarus Group: APT38 Bluenoroff
     
      b. Hunting Lazarus Group: APT38 Bluenoroff
     
      c. Hunting Lazarus Group: APT38 Bluenoroff
     
      d. Hunting Lazarus Group: APT38 Bluenoroff
     
      e. Hunting Lazarus Group: APT43 Kimsuky/Black Banshee
     
      f. Hunting Lazarus Group: APT43 Kimsuky/Black Banshee
     
      g. Hunting Lazarus Group: APT43 Kimsuky/BlackBanshee


 10. TRACKING NATION STATE ACTORS: CHINA
     
      a. Hunting for Volt Typhoon Infrastructure


 11. TRACKING POST EXPLOITATION FRAMEWORKS
     
      a. OST/C2 Code Review Guide
     
      b. Hunting Brute Ratel C4
     
      c. Hunting Brute Ratel C4
     
      d. Hunting DayBreak Infrastructure
     
      e. Hunting RedWarden C2 Redirector
     
      f. Hunting RedGuard C2 Redirector
     
      g. Hunting Mythic C2 Infrastructure
     
      h. Hunting Mythic C2 Infrastructure
     
      i. Hunting Octopus C2 Infrastructure
     
      j. Hunting ReverseSSH Infrastructure
     
      k. Hunting ReverseSSH Infrastructure
     
      l. Quiz


 12. HOW THREAT ACTORS MODIFY INFRASTRUCTURE TO EVADE DETECTION
     
      a. How Threat Actors Modify Infrastructure to Evade Detection: Cobalt
         Strike
     
      b. How Threat Actors Modify Infrastructure to Evade Detection: Sliver
     
      c. Hunting Cobalt Strike Malleable Profiles


 13. TRACKING MALWARE C2
     
      a. Hunting Pikabot C2 Infrastructure


 14. THREAT HUNTING WITH VALIDIN
     
      a. Hunting Cobalt Strike (Red Teams Edition)
     
      b. Hunting Cobalt Strike behind the CloudFlare


 15. OTHER TRACKING CAPABILITIES
     
      a. Open Directories


 16. FEEDBACK
     
      a. Feedback

Show more


ABOUT THIS COURSE

--------------------------------------------------------------------------------

 * $499.00
 * 45 lessons


PRICING OPTIONS

Discounts for pre-sale content are available, please feel free to contact us for
more information.


 * $499.00
   
   plus VAT
   
   contact@intel-ops.io


LEARN HOW TO TRACK APTS, CRIMINAL AND RANSOMWARE GROUPS

Please contact us if you are interested


INSTRUCTOR


MICHAEL KOCZWARA

FOUNDER

contact@intel-ops.io
Michael is an experienced Cybersecurity Professional with several years of
expertise in Threat Hunting, Penetration Testing, Red Teaming, and Security
Research.


WHAT TO EXPECT FROM THE COURSE?

Hunting Adversary Infrastructure is comprehensive training course that focuses
on Threat Actors Intelligence, providing knowledge from basic to advanced level.

 * You will learn and develop your own Hunting Hypotheses and Methodologies

 * You will learn how to track Threat Actors infrastructure

 * You will learn Advanced Pivoting Techniques

 * You will learn Theory and gain Practical skills that will benefit you in your
   research, interviews or at work

 * You will learn how Threat Actors modifies infrastructure to evade detection


FAQ

 * Can I refund products?
   
   I appreciate your interest in my training and your decision to purchase from
   me. It's important to me that my customers are fully informed about my sales
   policies before making a purchase. Please note that all sales are final, and
   I do not offer refunds once a purchase is made. This policy is in place due
   to the nature of my products and services. I encourage you to review the
   product descriptions, specifications, and any available previews carefully
   before making your purchase to ensure it meets your needs. If you have any
   specific questions or concerns about a product before purchasing, please do
   not hesitate to contact me via email. Thank you for your understanding.

 * After enrolling, how long will I have access to the course materials?
   
   Upon enrolling in our course, you'll receive lifetime access. This allows you
   to learn at your own pace and return to the content whenever needed, as often
   as you'd like.

 * Where I can submit my discount code?
   
   You can easily submit your discount code at the checkout page. When you're
   ready to complete your purchase, you'll find an option to enter your code.

 * Will this course be updated over time?
   
   Yes, this course will be continuously updated with new content. I am fully
   committed to keeping the course relevant, informative, and in line with my
   latest research and developments in the field. As part of your enrollment,
   you'll have access to all future updates and additions to the course
   material, ensuring that your learning experience remains current and
   comprehensive.

 * Is this training beginners friendly?
   
   I ensure that each module is easy to follow and understand, regardless of
   your prior experience in the subject. Whether you are just starting or
   looking to refresh your knowledge, this course offers an enriching and
   accessible learning experience for all beginners and advanced professionals.

 * I can only see a few modules available right now. Where are the rest?
   
   This is because my training is still in the active development process. The
   full suite of modules and materials is scheduled to be completed and ready
   for access by April 2024. I appreciate your patience and am excited to offer
   you a complete and enriching learning experience once all the modules are
   launched. Stay tuned for more updates!

 * How many video hours are included in the course?
   
   Currently, there are no video components available in the course as it is
   still under development. These videos will be added later on to provide
   comprehensive coverage of the course material.

 * Anyone can signup for the course?
   
   The course is not open for general enrollment. To maintain the integrity and
   security of the content, I am conducting a thorough vetting process. Only
   those who pass this vetting will be allowed to participate. This selective
   approach is essential due to the sensitive nature of the course material and
   to prevent potential threat actors from accessing the information

 * Home
 * All Products
 * Course Key Highlights
 * Privacy Policy
 * Terms of Service

 * 

© Copyright Hunting Adversary Infrastructure 2024