WEBVTT

00:00:01.940 --> 00:00:04.480
I hope you've enjoyed this course on Luckystrike and feel

00:00:04.480 --> 00:00:06.830
much more confident in your ability to use it to create

00:00:06.830 --> 00:00:08.220
your malicious Office documents.

00:00:08.640 --> 00:00:11.830
We're going to wrap up here by just pointing out a few more resources that

00:00:11.830 --> 00:00:15.750
you can utilize as you continue to develop your proficiency here. First,

00:00:15.750 --> 00:00:19.770
both the Luckystrike framework, as well as Invoke‑Obfuscation can be found

00:00:19.780 --> 00:00:21.550
in the following GitHub repositories.

00:00:22.440 --> 00:00:26.890
The macro generator, Unicorn, can also be found on GitHub. And if you're

00:00:26.890 --> 00:00:29.650
interested in learning more about Metasploit payloads,

00:00:29.650 --> 00:00:32.540
you can find information on their wiki, as well as other

00:00:32.540 --> 00:00:34.790
great courses in the Pluralsight catalog.

00:00:34.990 --> 00:00:38.040
Some additional information would be to look at the specific

00:00:38.040 --> 00:00:41.970
tactic category by referencing documentation from MITRE ATT&CK.

00:00:42.200 --> 00:00:45.330
And I would also encourage you to continue to explore the

00:00:45.330 --> 00:00:46.840
creation of custom payloads,

00:00:47.140 --> 00:00:50.080
how to establish persistence, and look at next stage

00:00:50.080 --> 00:00:51.450
goals such as lateral movement.

00:00:52.440 --> 00:00:54.850
Thank you again for spending time in this course with me,

00:00:54.980 --> 00:00:56.830
and I hope to continue to be a part of your

00:00:56.830 --> 00:00:58.390
professional journey here on Pluralsight.
