The goal of this product is to show and describe in detail chunks of different offensive executions we can usually find during real attack campaigns. There are a few main ideas and goals behind the course:

  • Teach you what offensive techniques exist in Linux, with mapping to the Linux Matrix

  • Deliver you a ready-to-copy-and-paste block of code that you can use during your own penetration testing/emulation engagements, red teaming, detection coverage testing, or EDR evaluations, with the possibility of chaining and creating advanced Linux custom attack paths

  • Provide you with step-by-step, hands-on instructions about the full Linux Kill Chain vs Detection

  • Teach you how to handle true hands-on evaluation testing of modern Linux EDR

  • Explain by offense what you should expect from modern Linux EDR products, with a focus on the internals, capabilities, detection, and operational efficiency

  • Power up your Breach and Attack Simulation Platforms (BAS)

  • Show you how to evaluate your Linux security tool's effectiveness across the attack lifecycle

  • Develop a more effective and scalable strategy to secure your organization

By using EDRmetry Matrix, you'll examine and learn how to execute custom Linux EDR attack tests mapped to MITRE ATT&CK Framework as evaluation checks. Thanks to the generic approach, you will be able to run your tests against whatever EDR you have/want to have in your production/testing/Cyber Range environment.

This practical approach will equip you with the skills to enhance your organization's defense against Linux advanced persistent threats.