From the course: Complete Guide to Cybersecurity: A Practical Approach

Unlock this course with a free trial

Join today to access over 24,600 courses taught by industry experts.

Understanding living-off-the-land and fileless malware

Understanding living-off-the-land and fileless malware

From the course: Complete Guide to Cybersecurity: A Practical Approach

Understanding living-off-the-land and fileless malware

- So we've been talking a lot about post exploitation techniques. You learned about lateral movement, exfiltration, and so on. But I want to take a moment to draw your attention back to the GitHub repository that we have been using. And specifically to the post exploitation section. Here, of course, I have a lot of information about lateral movement, different techniques, and fileless malware, or in this case, what we call, Living Off The Land, Binaries, and Useful Scripts. So in this section, what I want to, first is to define what is Living Off The Land, and what is fileless malware and the very basic concepts of that, but then deep dive into different techniques and different resources that you can actually use to perform post exploitation techniques, leveraging things that may be already in the compromise systems. So first of all, what is actually living off the land? Living off the land means that if you already compromise a system, let's say, I'm going to put V for victim again,…

Contents