Found several minor typos (e.g. spelling, grammatical, or relating to file names) in 3 files - they are surrounded by asterisks:
Day 1 - README.md
The payloads are customized **varients** of reverse shells from Pupy RAT and Metasploit.
Zip modified **SysIntenralsSuite** folder
Day 1 - payload_configs.md
Move cursor to **begining** of filename
Transfer **pyton.py** to Windows attack platform
Day 2 - README.md
Scenario begins with a target spearphishing leading into a low and slow, methodical approach to owning the **intial** target and eventually the entire domain
**Oneline** OneDrive Account
Generate DLL payload, then on a **seperate** Windows host:
Copy payloads to C2 server (wherever is **approapropriate** your C2 framework to have access to these files)
Prepare **intial** access payloads
**Login in** as domain admin user
Copy over the following files onto the Desktop of the **intial** victim:
Copy over `MITRE-ATTACK-EVALS.HTML` into **the the** Documents folder of the **intial** victim
You will now **recieve** a new, low integrity callback
You will now **recieve** a new, high integrity callback
**17.A - Blank Step 4**
Found several minor typos (e.g. spelling, grammatical, or relating to file names) in 3 files - they are surrounded by asterisks:
Day 1 - README.md
Day 1 - payload_configs.md
Day 2 - README.md