Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to emulate FIN6's initial access techniques in this 32-minute cybersecurity video that demonstrates creating and deploying malicious Word document macros for spear-phishing attacks. Practice hands-on in the CYBER RANGES platform's realistic attack environment while exploring the same tactics used by sophisticated threat actors. Access comprehensive resources including the CTID Adversary Emulation Library, practical labs, and step-by-step guidance for developing VBA macros in red team operations. Gain practical experience with adversary emulation through detailed demonstrations and real-world scenarios focused on initial access vectors.
Syllabus
Emulating FIN6 - Gaining Initial Access (Office Word Macro)
Taught by
HackerSploit