In today's Linux threat landscape, enterprises face increasingly sophisticated, targeted attacks. To effectively combat these threats, we must enhance our ability to detect malicious activity, inform threat-hunting processes, and understand attacker behavior. Dive into the world of modular Linux attack paths, local and remote exploitation, process injection, process hiding, network tunnelling/pivoting, data exfiltration, and syscall hooking techniques.
Get hands-on experience on how Linux malware and US/KS rootkits work in the well-prepared PurpleLabs Cyber Range. Analyze and modify source codes, find interesting behavior patterns in binaries and logs, determine which telemetry is needed to catch modern Linux threat actors, and find how to proactively validate and improve EDR/SOAR/SIEM detection coverage with step-by-step Linux adversary emulations. On top of that, run your VMs RAM acquisition ‘on click’ and analyze memory images with Volatility Framework 3 at any stage of the training. 100% Purple Teaming structure and only hands-on delivery style.
● This training helps create and understand low-level Linux attack paths, improve your Linux detection coverage, see in action many Open Source DFIR/defensive projects, and understand the need for Linux telemetry, including bare-metal, VMs, and Kubernetes clusters, where EDR/Runtime Security solutions are a must these days.
● This course takes on an “Attack-Detection-Inspection-Response” approach in a condensed, modular format. This class is dedicated to students with a basic understanding of Linux who must deal with advanced threats. Furthermore, the course is also interesting for experienced DFIR/SOC/CERT Players who aim to deepen their understanding of Linux internals and the corresponding network attack analysis, detection, and response techniques.
● As several questions arise about the evolving threat landscape, the provided training content and approach serve as your dynamic, centralized knowledge base for navigating the offensive Linux threat ecosystem with confidence, versus possible detection opportunities and DFIR.
● Full access to the PurpleLabs VPN environment for 30 days post-training and lifetime material access with updates included!
● This intensive, fully hands-on session is built entirely on the fresh content from my just-released Linux Attack, Detection and Live Forensics v2.0 - Hands-on Purple Teaming Playbook
