Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Defense Evasion with Veil

Course Cover
compare button icon

Course Features

icon

Duration

18 minutes

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

18 minutes

Course Description

Red Teamers, threat actors, and penetration testers often need to access target defenses in order to verify a vulnerability, or gain access to the target system to advance towards their agreed-upon goal. This course, Defense Evasion with Veil will show you how to use the Veil to execute opaque payloads in Red Team environments. You'll first learn how to install Kali Linux and create a payment through the UI. Next, you will apply your knowledge about creating a payload via the UI to create a similar one through the command line. This is for automation purposes. You'll also learn how to verify that the payloads you have generated are in the VirusTotal database. This course will equip you with the knowledge and skills to use Veil to perform these techniques T1027. Knowing how these techniques can be used against your organization or individual will help you to identify and defend against certain attack vectors.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

Finally, you’ll simulate how to check if any of the generated payloads is known within the VirusTotal database

More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors

Next, you’ll apply the knowledge learned about building the payload through the UI and create a similar payload through the command line for automation purposes

When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques T1027 using Veil

You'll learn how to install the framework within Kali Linux and create a payload through the UI

Course Cover