Gerardo. Ruiz
These last two weeks were hectic but incredibly rewarding as I completed the Initial Access Workshop under the expert guidance of Mariusz Banach.
This advanced training focused on the tactics, techniques, and procedures used by Threat Actors and Red Teams to establish initial footholds in network environments.
We delved into recently abused file vectors, macro-enabled Office documents, executable formats, and strategies for evading various cybersecurity controls.
The hands-on approach allowed us to understand and practice real-world scenarios, preparing us to defend our networks better.
I’m thrilled to have gained this certification and am eager to apply these critical insights to enhancing our cybersecurity posture.
A huge thank you to Mariusz Banach for leading this enlightening workshop!
#CyberSecurity #RedTeam #ThreatIntelligence #InfoSec #Certification
Posted on LinkedIn
Alireza Vahdad
Thrilled to announce my completion of the "Modern Initial Access and Evasion Tactics" training!
What an intense yet incredible journey and a valuable addition to my arsenal of initial access strategies!
Huge thanks to Mariusz Banach for his insightful teachings and warm personality.
Connecting with you was a fantastic bonus of the course! 😊
I highly recommend this course to anyone eager to deepen their understanding and skillset in this domain.
Posted on LinkedIn
Mitchel Jordan - Senior Security Engineer, Praetorian Security, Inc.
Mariusz is a passionate security researcher with a depth of knowledge to share during the Modern Initial Access & Evasion Tactics course.
I walked away with several new TTPs and ideas to operationalize/incorporate into my team's engagements.
Will for sure be on the lookout for his future workshops.
Eternalkyu @eternalky_u
Mariusz Banach's (mgeeky) 'Modern Initial Access and Evasion Tactics' course was the first training I took this year.
Here is my review, written from the perspective of an experienced web developer.
@jhaddix's TBBHM training (which I took in December 2023) suggested Mariusz's course, and the upcoming session was already fully booked, so I could not wait for a spot to open up in the next training.
I promptly reserved a seat after Mariusz announced the new schedule around Christmas.
What immediately stood out to me was that the whole course, communication, and execution were so well-prepared and professional:
- » You get lifetime access to a student VM containing all the training tools, code, and a lot of scripts that Mariusz wrote himself, which makes using the provided material so much easier.
- » You get access to various hosted apps, e.g., a Mythic C2 instance, that Mariusz provides. The provided setup allows you to get your hands dirty with the provided exercises and adds so much to the value of the training.
- » You get immediate access to this day's recording at the end of each course day.
- » The student area contains up-to-date slides and links to the recordings, so you can always come back and review the material again.
... Read more on Eternalkyu's blogpost!
Sean @au5_mate
Just finished up @mariuszbit's initial access course.
Despite being well-versed in the topic beforehand, I learned some awesome new tips and tricks, and gained some further knowledge of concepts
that I just hadn't reached the same depth of understanding of before the course.
Would definitely recommend it for anyone looking to upskill or reinforce their knowledge of initial access TTPs, lots for both Red & Blue teamers to take away from it!
Posted on Twitter
Arthur @theart42
Mariusz knows the subjects really really well, has done a lot of work on tooling himself and is able to explain it really well.
These are three days of intense information absorption I can apply in my work.
Posted on Twitter
Cory Rondorf
I recently had the opportunity to take "Modern Initial Access and Evasion Tactics" by Mariusz Banach (binary-offensive.com).
It's a fantastic course exploring various modern initial access techniques and AV/EDR evasion strategies.
I highly recommend this course for any offensive security professionals.
#redteam #edr #evasion #phishing #offensivesecurity
Posted on LinkedIn
Pierre @pruno9
Mgeeky really knows its subject and succeeds at transmiting the core concept in a limited amount of time.
Even for the parts he claims not knowing very well he still took the time to do the research to give us some basic concepts to expand on.
Too bad Microsoft pretty much killed macros because Mgeeky really worked on that and it shows, still very interesting even less usable than before.
In summary, a very interesting course with actually usable and facilitated (with mgeeky's provided tools) tactics.
Stefan Bauregger
Mgeeky shows in this training that he is a top-notch red teamer and shares his knowledge, insights and war-stories.
It was amazing to hear about his methodology and to get access to some of his tooling.
Dipen Patel
Marius is exceptional with his course, content.
I have learned a lot of new things during the class, the course is up to date with real world examples.
I highly recommend this course to anyone who seeking to learn new things or upgrade their current knowledge.
Ivan Da Silva @humble_desser
Mariusz Banach is a red team operator and former malware analyst that has poured his heart and knowledge into his Malware Development training.
I was lucky enough to take his training and I was impressed with his research and knowledge of the subject(s).
I would recommend this training to anyone interest into getting familiar with malware development.
Also mentioned on LinkedIn
Jakub Dzieciątko @aol1306
Mariusz created the best training on malware development I have ever attended and has great teaching skills. He's clearly an expert on the topic and he enjoys sharing his own research. I'm going to recommend his work to anyone interested in red teaming. The things I liked the most about it:
- the amount of useful content
- the materials created in a way I can easily use them later
- inspiring methods of tool creation
- good organization - infection divided into stages, each stage well explained and multiple techniques presented
- going together with the exercises so I could see how you work
- presenting methods to find our own evasion etc techniques
Olivier Lamotte @olamotte33
Throughout the fast-paced training Mariusz took the time to engage with students to make sure every topic became clear. Mariusz's contributions to the offensive security community are always mindful of the impact on the defensive side, which is too rare these days. Thank you for a great training with a ton of actionable content.
Today was the last day of @mariuszbit's training. I can honestly recommend it to anyone, who is interested in Red Teaming. Content is great and I can't wait to deploy some novel initial access techniques. Wanna decrease detection rate of your implants? Then,this is a no-brainer👍
— Jan Kopecky (@rnmx123) October 21, 2022
anonymized @anonymized
Hey guys, I can confirm that me and other guys from our team had a training from Mariusz last week. The framework looks pretty l33t, but I still haven't explored most of it... it is actually pretty big 😄 so, I'm still discovering all the possibilities. The training was amazing and as far as initial access and all kind of tactics to keep your malware undetected are concerned, it was even better than [CUT] or [CUT] 👍🏻