gtworek.com
Open in
urlscan Pro
52.223.52.2
Public Scan
Submitted URL: https://click.convertkit-mail2.com/gku5dnezr2f5hdvrvv7frh8nol999bm/m2h7h5h842g9vzsm/aHR0cHM6Ly9ndHdvcmVrLmNvbS9tYXN0ZXJpbmctd2luZG9...
Effective URL: https://gtworek.com/mastering-windows-internals
Submission: On November 28 via manual from US — Scanned from CA
Effective URL: https://gtworek.com/mastering-windows-internals
Submission: On November 28 via manual from US — Scanned from CA
Form analysis
0 forms found in the DOMText Content
MASTERING WINDOWS INTERNALS Get access MASTERING WINDOWS INTERNALS [BLACK FRIDAY 50% OFF] 04 : 05 : 03 : 27 LEARN HOW TO NAVIGATE THE COMPLEX WINDOWS KERNEL, UNDERSTAND THE LIFECYCLE OF BINARIES, GRASP THE INTRICACIES OF AUTHENTICATION AND AUTHORIZATION, EXPLORE VARIOUS PERSISTENCE TECHNIQUES, AND GAIN A DEEP UNDERSTANDING OF THE WINDOWS REGISTRY. Get access GET HANDS-ON EXPERIENCE WITH A DIVERSE TOOLKIT THAT INCLUDES LESSER-KNOWN OPEN-SOURCE TOOLS AND PAID SOFTWARE, ENABLING YOU TO PUT YOUR KNOWLEDGE INTO PRACTICE EFFECTIVELY. DEEPEN YOUR COMPREHENSION OF CRUCIAL CYBERSECURITY CONCEPTS IMPROVE YOUR SKILL SET EXPLORE NEW CAREER PROSPECTS IN THE CYBERSECURITY FIELD Get access to the course COURSE OUTLINE 1.TALKING TO THE WINDOWS KERNEL WE KICK OFF WITH A HIGHLY ENGAGING TOPIC - BYOVD OR BRING YOUR OWN VULNERABLE DRIVER. RATHER THAN STRUGGLING TO GET INTO THE WINDOWS KERNEL, YOU CAN LEVERAGE CODE THAT ALREADY HAS PERMISSION TO RUN THERE. YOU CAN HALT WHAT SEEMS UNSTOPPABLE, READ WHAT APPEARS UNREADABLE, OR EVEN CRASH THE SYSTEM DUE TO A MINOR ERROR. THIS MODULE EXPLAINS SYSCALLS, IOCTLS, AND FCTLS. YOU CAN ANTICIPATE A LOT OF C PROGRAMMING, BUT THE SILVER LINING IS THAT IT'S PRIMARILY ABOUT INTERPRETING THE CODE ALREADY PREPARED FOR YOU. 2.EXES, DLLS, AND OTHER BINARIES RUNNING AN EXE FILE IS SIMPLE - A DOUBLE-CLICK SUFFICES. BUT WHAT TRANSPIRES THEREAFTER? HOW ARE REQUIRED BINARIES LOCATED, LOADED, UTILIZED, OR MISUSED? BRACE YOURSELF FOR A JOURNEY INTO PROCESSES, PE FILES, SEARCH ORDERS, AND PEBS. AND NOT TO FORGET, LOLBINS. 3. AUTHENTICATION AND AUTHORIZATION IN THE REALM OF SECURITY, THE TWO PARAMOUNT QUESTIONS ARE "WHO ARE YOU?" AND "WHAT ARE YOU TRYING TO DO?". IN THIS MODULE, WE DELVE INTO THE MECHANISMS THAT ANSWER THESE CRUCIAL QUESTIONS. WE CONCENTRATE ON LOCAL MECHANISMS (NO ACTIVE DIRECTORY THIS TIME), ALLOWING US TO INVESTIGATE MORE DEEPLY. 4. PERSISTENCE TECHNIQUES WE DON'T QUESTION WHETHER YOU'RE ATTACKING OR DEFENDING WINDOWS SYSTEMS. HOWEVER, IRRESPECTIVE OF YOUR ROLE, YOU SHOULD UNDERSTAND HOW AN OPERATING SYSTEM CAN BE MANIPULATED TO EXECUTE ATYPICAL CODE. WHILE WE WON'T COVER ALL METHODS, I WILL STRIVE TO PRESENT A SYSTEMATIC APPROACH AND CATEGORIZATION, ENABLING YOU TO ATTACK OR DEFEND WINDOWS SYSTEMS AS PER YOUR REQUIREMENTS. 5. WINDOWS REGISTRY I WON'T BE SHOWING YOU HOW TO CHANGE THE DESKTOP WALLPAPER OR ENABLE SMB SIGNING. BUT IF YOU ASPIRE TO DO THAT SOMEDAY, YOU'LL UNDERSTAND HOW THE DATA IS RECORDED, WHERE IT'S STORED, AND HOW THE OPERATING SYSTEM USES IT. YOU'LL ALSO COMPREHEND WHY ONE OF THE MOST FREQUENTLY USED REGISTRY KEYS DOESN'T ACTUALLY EXIST AND WHAT TRANSPIRES IF THE PATH CONTAINS MORE THAN 512 LEVELS. AND YES, WE'LL DELVE INTO SOME EVEN MORE NERDY STUFF. 6. THE TOOLKIT THE COURSE WOULDN'T BE COMPLETE WITHOUT TOOLS. AT TIMES IT'S LESSER-KNOWN OPEN-SOURCE SOFTWARE, AT OTHERS, IT'S APPROPRIATELY CONFIGURED SYSINTERNALS UTILITIES THAT YOU USE EVERY DAY, AND SOMETIMES IT'S REASONABLY PRICED COMMERCIAL SOFTWARE. I WILL SHARE WHAT TOOLS I USE AND, MORE IMPORTANTLY, HOW I USE THEM. BY THE END OF THE COURSE, YOU'LL HAVE ACQUIRED THE KNOWLEDGE THAT EMPOWERS YOU TO CONTINUE YOUR LEARNING JOURNEY INDEPENDENTLY. MASTERING WINDOWS INTERNALS COURSE [BLACK FRIDAY 50% OFF] Course Access Only Access to course with carefully curated collection of crucial modules that will elevate your expertise in cybersecurity, specifically focusing on mastering Windows Internals. $499 $249 one-time payment Access to 6 x 90-min recorded sessions based on the Course Outline Lifetime access to all the recordings and future updates Get Course Access Course + Community Access Access to relevant stuff that matters for those who want to be smarter about Microsoft Security, level up cybersecurity skills, and accelerate a career. $999 $499 one-time payment Everything in Course Access 2 live sessions per month from Grzegorz Tworek and external guest speakers Recordings of all 23 x 90 min previous sessions Lifetime access to the community of 150+ cybersecurity professionals Get Community Access BONUS: MASTERING WINDOWS FORENSICS COURSES FOR THOSE WHO CHOOSE COURSE + COMMUNITY ACCESS, AS A BONUS, YOU WILL ALSO GET ACCESS TO THE “MASTERING WINDOWS FORENSICS” COURSE (A $399 VALUE) INCLUDED IN OUR MEMBERSHIP PLATFORM. WHO IS MASTERING WINDOWS INTERNALS FOR YOU'RE READY TO DELVE DEEPER BUT UNSURE OF THE MOST EFFECTIVE PATH TO ADVANCE YOUR KNOWLEDGE. YOU HAVE EXTENSIVE EXPERIENCE IN CYBERSECURITY BUT YOU FEEL LIKE YOU'VE HIT A PLATEAU. YOU'RE EAGER TO TACKLE MORE COMPLEX CHALLENGES BUT THE LANDSCAPE OF WINDOWS INTERNALS SEEMS VAST AND OVERWHELMING. YOU WANT TO UPSKILL BUT THE THOUGHT OF SELF-GUIDED LEARNING FEELS TOO DAUNTING AND UNSTRUCTURED. YOU WANT TO STAND OUT IN YOUR FIELD BUT ARE UNSURE HOW TO ELEVATE YOUR EXPERTISE BEYOND THE NORM. PERHAPS YOU'RE ALREADY A SEASONED PROFESSIONAL BUT YOU FEEL LIKE YOU'RE NOT PROGRESSING AT THE PACE YOU ANTICIPATED. MAYBE YOU'RE A PENETRATION TESTER, A SECURITY RESEARCHER, OR A SYSTEM ADMINISTRATOR AND YOU'RE READY FOR THE NEXT STEP, BUT YOU NEED THE RIGHT COURSE TO GUIDE YOU. CURATED BY GRZEGORZ TWOREK MICROSOFT MVP, SECURITY FANATIC, PERSONIFIED WINDOWS DEFENDER. MEMBER OF MICROSOFT SECURITY TRUSTED ADVISORS AND THE MICROSOFT SPRINGBOARD TECHNICAL EXPERTS PANEL. LED THE WINDOWS TEAM IN THE NATO COOPERATIVE CYBER DEFENCE CENTRE OF EXCELLENCE’S LOCKED SHIELDS EXERCISES IN 2021, 2022, AND 2023. ALSO HAS A CONTRIBUTION TO THE GITHUB ARCHIVE PROGRAM’S ARCTIC CODE VAULT AND HAS BEEN NOMINATED AS A MICROSOFT MOST VALUABLE PROFESSIONAL FOR 17 CONSECUTIVE YEARS, STARTING FROM 2007. TRUSTED BY PROFESSIONALS TOMASZ ONYSZKO CTO of Predica, Microsoft Regional Director (ex 14 times MVP) In its unique way, Grzegorz knows how to convey his deep knowledge in real-world use cases and scenarios. Learning with him and tapping into his way of thinking is a one-of-a-kind learning experience. JOHN HAMMOND Cybersecurity Researcher, Educator The way Greg (Grzegorz) presents topics is truly engaging and fascinating. His knowledge is of high quality and top-notch. If you want to dive deeper into Microsoft Security, learning from him is a must. PIOTR WIĘCEK Freelance Offensive Security Specialist Grzegorz is a recognized expert in the field of Windows, excelling at simplifying complex topics for easy understanding. The materials he presented during the sessions helped me improve my skills as a penetration tester. FAQ Is it a monthly payment? Is there any guarantee? Is it exclusively for professionals? CATCH THE BLACK FRIDAY OFFER! AVAILABLE ONLY UNTIL NOVEMBER 29, 2024 Get access © 2024 gtworek.com