gtworek.com Open in urlscan Pro
52.223.52.2  Public Scan

Submitted URL: https://click.convertkit-mail2.com/gku5dnezr2f5hdvrvv7frh8nol999bm/m2h7h5h842g9vzsm/aHR0cHM6Ly9ndHdvcmVrLmNvbS9tYXN0ZXJpbmctd2luZG9...
Effective URL: https://gtworek.com/mastering-windows-internals
Submission: On November 28 via manual from US — Scanned from CA

Form analysis 0 forms found in the DOM

Text Content

MASTERING WINDOWS INTERNALS

Get access


MASTERING
WINDOWS INTERNALS
[BLACK FRIDAY 50% OFF]

04 : 05 : 03 : 27


LEARN HOW TO NAVIGATE THE COMPLEX WINDOWS KERNEL, UNDERSTAND THE LIFECYCLE OF
BINARIES, GRASP THE INTRICACIES OF AUTHENTICATION AND AUTHORIZATION, EXPLORE
VARIOUS PERSISTENCE TECHNIQUES, AND GAIN A DEEP UNDERSTANDING OF THE WINDOWS
REGISTRY.

Get access


GET HANDS-ON EXPERIENCE WITH A DIVERSE TOOLKIT THAT INCLUDES LESSER-KNOWN
OPEN-SOURCE TOOLS AND PAID SOFTWARE, ENABLING YOU TO PUT YOUR KNOWLEDGE INTO
PRACTICE EFFECTIVELY.


DEEPEN YOUR COMPREHENSION
OF CRUCIAL CYBERSECURITY CONCEPTS


IMPROVE YOUR SKILL SET


EXPLORE NEW
CAREER PROSPECTS
IN THE CYBERSECURITY
FIELD

Get access to the course



COURSE OUTLINE




1.TALKING TO THE WINDOWS KERNEL


WE KICK OFF WITH A HIGHLY ENGAGING TOPIC - BYOVD OR BRING YOUR OWN VULNERABLE
DRIVER. RATHER THAN STRUGGLING TO GET INTO THE WINDOWS KERNEL, YOU CAN LEVERAGE
CODE THAT ALREADY HAS PERMISSION TO RUN THERE. YOU CAN HALT WHAT SEEMS
UNSTOPPABLE, READ WHAT APPEARS UNREADABLE, OR EVEN CRASH THE SYSTEM DUE TO A
MINOR ERROR. THIS MODULE EXPLAINS SYSCALLS, IOCTLS, AND FCTLS. YOU CAN
ANTICIPATE A LOT OF C PROGRAMMING, BUT THE SILVER LINING IS THAT IT'S PRIMARILY
ABOUT INTERPRETING THE CODE ALREADY PREPARED FOR YOU.




2.EXES, DLLS, AND OTHER BINARIES


RUNNING AN EXE FILE IS SIMPLE - A DOUBLE-CLICK SUFFICES. BUT WHAT TRANSPIRES
THEREAFTER? HOW ARE REQUIRED BINARIES LOCATED, LOADED, UTILIZED, OR MISUSED?
BRACE YOURSELF FOR A JOURNEY INTO PROCESSES, PE FILES, SEARCH ORDERS, AND PEBS.
AND NOT TO FORGET, LOLBINS.




3. AUTHENTICATION AND AUTHORIZATION


IN THE REALM OF SECURITY, THE TWO PARAMOUNT QUESTIONS ARE "WHO ARE YOU?" AND
"WHAT ARE YOU TRYING TO DO?". IN THIS MODULE, WE DELVE INTO THE MECHANISMS THAT
ANSWER THESE CRUCIAL QUESTIONS. WE CONCENTRATE ON LOCAL MECHANISMS (NO ACTIVE
DIRECTORY THIS TIME), ALLOWING US TO INVESTIGATE MORE DEEPLY.




4. PERSISTENCE TECHNIQUES


WE DON'T QUESTION WHETHER YOU'RE ATTACKING OR DEFENDING WINDOWS SYSTEMS.
HOWEVER, IRRESPECTIVE OF YOUR ROLE, YOU SHOULD UNDERSTAND HOW AN OPERATING
SYSTEM CAN BE MANIPULATED TO EXECUTE ATYPICAL CODE. WHILE WE WON'T COVER ALL
METHODS, I WILL STRIVE TO PRESENT A SYSTEMATIC APPROACH AND CATEGORIZATION,
ENABLING YOU TO ATTACK OR DEFEND WINDOWS SYSTEMS AS PER YOUR REQUIREMENTS.




5. WINDOWS REGISTRY


I WON'T BE SHOWING YOU HOW TO CHANGE THE DESKTOP WALLPAPER OR ENABLE SMB
SIGNING. BUT IF YOU ASPIRE TO DO THAT SOMEDAY, YOU'LL UNDERSTAND HOW THE DATA IS
RECORDED, WHERE IT'S STORED, AND HOW THE OPERATING SYSTEM USES IT. YOU'LL ALSO
COMPREHEND WHY ONE OF THE MOST FREQUENTLY USED REGISTRY KEYS DOESN'T ACTUALLY
EXIST AND WHAT TRANSPIRES IF THE PATH CONTAINS MORE THAN 512 LEVELS. AND YES,
WE'LL DELVE INTO SOME EVEN MORE NERDY STUFF.




6. THE TOOLKIT


THE COURSE WOULDN'T BE COMPLETE WITHOUT TOOLS. AT TIMES IT'S LESSER-KNOWN
OPEN-SOURCE SOFTWARE, AT OTHERS, IT'S APPROPRIATELY CONFIGURED SYSINTERNALS
UTILITIES THAT YOU USE EVERY DAY, AND SOMETIMES IT'S REASONABLY PRICED
COMMERCIAL SOFTWARE. I WILL SHARE WHAT TOOLS I USE AND, MORE IMPORTANTLY, HOW I
USE THEM. BY THE END OF THE COURSE, YOU'LL HAVE ACQUIRED THE KNOWLEDGE THAT
EMPOWERS YOU TO CONTINUE YOUR LEARNING JOURNEY INDEPENDENTLY.




MASTERING WINDOWS INTERNALS COURSE
[BLACK FRIDAY 50% OFF]

Course Access Only




Access to course with carefully curated collection of crucial modules that will
elevate your expertise in cybersecurity, specifically focusing on mastering
Windows Internals.

$499

$249 one-time payment

Access to 6 x 90-min recorded sessions
based on the Course Outline

Lifetime access to
all the recordings and future updates




Get Course Access

Course + Community Access




Access to relevant stuff that matters for those who want to be smarter about
Microsoft Security, level up cybersecurity skills, and accelerate a career.



$999

$499 one-time payment

Everything in Course Access

2 live sessions per month from
Grzegorz Tworek and external guest speakers

Recordings of all 23 x 90 min previous sessions

Lifetime access to the community
of 150+ cybersecurity professionals

Get Community Access



BONUS:
MASTERING WINDOWS FORENSICS COURSES




FOR THOSE WHO CHOOSE COURSE + COMMUNITY ACCESS, AS A BONUS, YOU WILL ALSO GET
ACCESS TO THE “MASTERING WINDOWS FORENSICS” COURSE (A $399 VALUE) INCLUDED IN
OUR MEMBERSHIP PLATFORM.






WHO IS MASTERING WINDOWS INTERNALS FOR






YOU'RE READY
TO DELVE DEEPER


BUT UNSURE OF THE MOST EFFECTIVE PATH TO ADVANCE YOUR KNOWLEDGE.


YOU HAVE EXTENSIVE EXPERIENCE
IN CYBERSECURITY


BUT YOU FEEL LIKE YOU'VE HIT A PLATEAU.






YOU'RE EAGER TO TACKLE MORE
COMPLEX CHALLENGES


BUT THE LANDSCAPE OF WINDOWS INTERNALS SEEMS VAST AND OVERWHELMING.


YOU WANT TO UPSKILL


BUT THE THOUGHT OF SELF-GUIDED LEARNING FEELS TOO DAUNTING AND UNSTRUCTURED.


YOU WANT TO STAND OUT
IN YOUR FIELD


BUT ARE UNSURE HOW TO ELEVATE YOUR EXPERTISE BEYOND THE NORM.


PERHAPS YOU'RE ALREADY
A SEASONED PROFESSIONAL


BUT YOU FEEL LIKE YOU'RE NOT PROGRESSING AT THE PACE YOU ANTICIPATED.


MAYBE YOU'RE A PENETRATION TESTER, A SECURITY RESEARCHER,
OR A SYSTEM ADMINISTRATOR


AND YOU'RE READY FOR THE NEXT STEP, BUT YOU NEED
THE RIGHT COURSE TO GUIDE YOU.


CURATED BY GRZEGORZ TWOREK


MICROSOFT MVP, SECURITY FANATIC, PERSONIFIED WINDOWS DEFENDER. MEMBER OF
MICROSOFT SECURITY TRUSTED ADVISORS AND THE MICROSOFT SPRINGBOARD TECHNICAL
EXPERTS PANEL.

LED THE WINDOWS TEAM IN THE NATO COOPERATIVE CYBER DEFENCE CENTRE OF
EXCELLENCE’S LOCKED SHIELDS EXERCISES IN 2021, 2022, AND 2023.

ALSO HAS A CONTRIBUTION TO THE GITHUB ARCHIVE PROGRAM’S ARCTIC CODE VAULT AND
HAS BEEN NOMINATED AS A MICROSOFT MOST VALUABLE PROFESSIONAL FOR 17 CONSECUTIVE
YEARS, STARTING FROM 2007.




TRUSTED BY PROFESSIONALS


TOMASZ ONYSZKO

CTO of Predica, Microsoft
Regional Director
(ex 14 times MVP)

In its unique way, Grzegorz knows how to convey his deep knowledge in real-world
use cases and scenarios. Learning with him and tapping into his way of thinking
is
a one-of-a-kind learning experience.


JOHN HAMMOND

Cybersecurity Researcher,
Educator

The way Greg (Grzegorz) presents topics is truly engaging and fascinating. His
knowledge is of high quality and top-notch. If you want to dive deeper into
Microsoft Security, learning from him is a must.


PIOTR WIĘCEK

Freelance Offensive
Security Specialist

Grzegorz is a recognized expert in the field of Windows, excelling at
simplifying complex topics for easy understanding.
The materials he presented during the sessions helped me improve my skills as a
penetration tester.


FAQ

Is it a monthly payment?



Is there any guarantee?

Is it exclusively for professionals?


CATCH THE BLACK FRIDAY OFFER!
AVAILABLE ONLY UNTIL NOVEMBER 29, 2024

Get access

© 2024 gtworek.com