×

HOW TO GET SUPPORT

1 Contact our expert personel
2 Problem Detection and Analysis
3 Permanent Solutions

If you still have problems, please let us know, by sending an email to info@nationalkeep.com . Thank you!

WORK HOURS

Mon-Fri 9:00AM - 6:00PM
Sat - 9:00AM-5:00PM
Sundays by appointment only!

Training Services

ATTACKING TECHNIQUES

In today's world, a successful cyber attack contains very complicated layers of preparation where aach layer requires its own expertise.

For instance, a recent cyber attack targeting financial institutions had to complete each following step:

* Prepare a malicious office file and send it to the victim
* Retrieve the key from the C&C server
* By using the key depackage zero day exploit and run it
* Exploit a zero day Use-After-Free vulnerability
* Create an ad-hoc VirtualProtect function and create a writable area inside memory
* Run the shellcode
* Bypass mitigation mechanisms such as AVs

This training aims to introduce skeleton of a cyber attack with all its steps.

TOP