1. Welcome!

Download

Everybody and welcome to breaching the perimeter with enterprise fishing course.

My name is Brandon Dennis and the CEO and lead instructor of Red Team Nation, and I'll be your instructor throughout nature of this course.

So for some house cleaning items, first off, if you don't already make sure you go to a Ask.com and create yourself an account.

We're going to be using the free tier for this show.

It shouldn't cost you anything, but make sure you do have that account set up ready to go before you start the course.

And if you're not familiar with a basic level of Python, please take a moment to look at editorial inside of the resources section to kind of get a quick brush up before we continue.

Both of these things are going to be very, very key and very important for the course going forward.

Now, some additional information.

So we have a Red Team Nations student only group that's on Facebook that will be in the resource section as well.

So feel free to join that.

It'll be asking questions, answering questions that aren't necessarily done directly on this platform through Q&A.

Both is fine.

I will be there to answer both sides of the fence.

But just note that it's there with the other students.

Now I also have two other courses, which is the Red Team Blueprint Unique Guide to ethical hacking, which takes you from start to finish into a ethical hacking career, which also does include a Python course and hacking the Windows API with Python specifically also takes that to the next level on how to interface with the Windows API under the hood.

I would wholly recommend checking out all three of these, more specifically the student group.

All of them will be in the resources section below.

Now, the fun part.

What are our topics?

Now this is a small list of topics, you'll start seeing each of these expand as we go to the course, but our first thing is is we want to find out what enterprise fishing is.

We'll go through all of that, how it works.

We'll also take a look at how to offer in human psychology, works with fishing analysis in the psychology course.

Bear that in mind.

So this is just for how it works with enterprise fishing, such as time of day, personal things, things like that to trigger your fishers to have more success than they would naturally have otherwise.

We'll also go into creating and configuring and the fishing emails, the domains, hosting and building up IWC Armey's and using some python for automation for S3 to those two instances.

So this is going to help us build some automation around the whole infrastructure.

So that way we can tear things down, build things up as fast as possible without having to do a bunch of rebuilding.

And this leaves a good framework for you to start from as you add potential things like TerraForm or cloud formation scripts, which will take this even further into a one button click.

You're done.

So we'll be working with Evil Jinks two and goldfish to perform our next gen phishing attacks.

Now, Evil Jinx is our reverse proxy, which will allow us to basically bypass to a face for ourselves and go fish will actually handle sending out the emails via.

It's very, very nice platform and it's got statistics and everything else for auditing, so that works really, really well.

The last piece here is that we're going to put it all together and show one full attack chain from from start to end.

How we build out the email, how to get it all set up, utilizing our allies, making sure our python is working and sinking the data across, compromising ourselves, making sure it works and eventually taking over the user account.

So I hope you all have fun and enjoy the course.

Complete and Continue  

Become a Member and Get Unlimited Access to 310+ Top Cyber Security Courses.