XINTRA Logo
SimulationsCourses
Login

CoursesAdvanced APT Threat Hunting & IR

on-demand
live
offence
01

Hunt for advanced APT threats and respond to them.

APTs are constantly evolving their attack techniques, putting pressure on responders and blue teamers to stay up-to-date on all the latest tactics, techniques and procedures. Depending on the nature of the organization, responders and blue teamers may have never responded to a nation-state level threat in their environment. This course is built to arm attendees with the ability to detect, respond and remediate an APT-level attack. Attendees will be challenged with practical labs built around a simulated APT intrusion "Assassin Kitty". Students will be exposed to endpoint forensics, log analysis and cloud forensics on up-to-date attack techniques leveraged by Russian, Chinese, North Korean and Iranian APT groups against organizations within the last two years.

/Course Details
Advanced APT Threat Hunting & IR
$1,650 USD
365 Day Access
12 months XINTRA Simulations
Gift With Purchase
128 Videos
33 Labs
40+ Hours of Content
/Course Trainer
Lina Lau (@InverseCos)
Trainer
Lina Lau (@InverseCos)
Founder of XINTRA, Lina is a security researcher, Black Hat trainer, SANS advisory board member and has presented at several international conferences and authored a book on cybersecurity. She currently holds the following certifications: GXPN, GASF, GREM, GCFA and OSCP.
@inversecos
Fig. ACourse Syllabus
01.

Introduction

IntroductionPreview
02.

Course Set-up

Course Set-Up
03.

Attack Scenario & Labs

Attack Scenario & Labs
04.

Incident Timelining

Incident Timelining
05.

Network Log Analysis

Introduction to ELK
Network Log Analysis
Firewall Logs
Proxy Log Analysis
LAB: Proxy Log Analysis
SOLUTION: Proxy Log Analysis
IIS Log Analysis
LAB: IIS Log Analysis
SOLUTION: IIS Log Analysis
06.

Webshells & Exploitation

Webshells & Exploitation
Java Deserialisation
IIS Webshell Abuse
LAB: ASPX Webshell Analysis
SOLUTION: ASPX Webshell Analysis
Other Webshell Abuse
User Access Log Analysis
LAB: Webshell Analysis For Functionality
SOLUTION: Webshell Analysis For Functionality
LAB: MsManagement Exchange Analysis
SOLUTION: MsManagement Exchange Analysis
07.

Entra ID & Azure Forensics

Entra ID & Azure
Oauth 2.0 Abuse
LAB: OAuth Abuse
SOLUTION: OAuth Abuse
M365 Business Email Compromise
LAB: Unified Audit Log
SOLUTION: Unified Audit Log
08.

Artifacts of Execution & File Presence

Artifacts of Execution
Prefetch
LAB: Prefetch
SOLUTION: Prefetch
SRUM
Shimcache
Amcache
LAB: Amcache Analysis
SOLUTION: Amcache Analysis
PowerShell Logs
Entra ID & Azure Host LogsPreview
LAB: PowerShell Analysis
SOLUTION: PowerShell Analysis
LAB: Entra Commandline logs
SOLUTION: Entra Commandline logs
ActivitiesCache.DB
MPLog
LAB: MPLog Analysis
SOLUTION: MPLog Analysis
09.

NTFS Deep Dive

NTFS Overview
$MFT Forensics (Master File Table)
LAB: $MFT Analysis
SOLUTION: $MFT Analysis
$USNJRNL & $J
$Logfile
$I30
LAB: $J Analysis on Deleted Files
SOLUTION: $J Analysis on Deleted Files
10.

Credential Dumping

Credential Dumping Deepdive
Kerberos Attacks - Gold, Silver, Diamond, Sapphire
Hashes
LAB: Hash Credential Compromise
SOLUTION: Hash Credential Compromise
Cached Credentials
Tokens
SAM Hive
NTDS.dit
LAB: NTDS.dit
SOLUTION: NTDS.dit
11.

Golden SAML

Golden SAML Attack Overview
LAB: Golden SAML
SOLUTION: Golden SAML
12.

APT Persistence Techniques

APT Persistence Techniques
BYOVD (Bring Your Own Vulnerable Driver)
Abusing Services
LAB: Malicious Service
SOLUTION: LAB Malicious Service
Scheduled Tasks
LAB: Scheduled Tasks
SOLUTION: Scheduled Tasks
LSA SSP/AP & Skeleton Key
DLL Search Order Hijacking
DLL Proxying
Phantom DLL Hijacking
COM Hijacking
Image File Execution Options (IFEO)
Application ShimmingPreview
13.

Registry, File Access & Browser Forensics

Registry Artifacts
LNK File Analysis
LAB: LNK File Abuse
SOLUTION: LNK File Abuse
LAB: LNK File Access
SOLUTION: LNK File Access
Browser Forensics
LAB: Browser Forensics
SOLUTION: Browser Forensics
LAB: Registry Artifacts
SOLUTION: Registry Artifacts
14.

Lateral Movement & Event Log Analysis

Lateral Movement & Event Log Analysis
LAB: User Creation
SOLUTION: User Creation
LAB: File Share Lateral Movement
SOLUTION: File Share Lateral Movement
LAB: WMIEXEC
SOLUTION: WMIEXEC
15.

APT Defence Evasion Techniques

Defence Evasion Techniques
Timestomping Files
LAB: File Timestomping
SOLUTION: File Timestomping
Registry Timestomping
Abusing SDELETE
LAB: SDELETE
SOLUTION: SDELETE
Windows Event Log Evasion (Services)
Event Log Modification
Event Tracing for Windows Bypass (ETW)
16.

Exfiltration Methods

Overview of Exfiltration
File Share Service
LAB: Cloud File Share Service Exfiltration
SOLUTION: Cloud File Share Service Exfiltration
Detecting Cobalt Strike
LAB: Cobalt Strike Lateral Movement
SOLUTION: Cobalt Strike Lateral Movement
Cobalt Strike Interface
LAB: Cobalt Config Extraction
SOLUTION: Cobalt Config Extraction
17.

What Actually Happened?

What Actually Happened?
/Frequently Asked Questions
Advanced APT Threat Hunting & IR
$1,650 USD
/More Courses
Request a Demo
©2025 XINTRA. All rights reserved.