PURPLE TEAM LAB OFFICIAL COURSEWARE
"You can't build a real defense until you've walked through a real attack." By Antonio
⚠️ READ THIS FIRST ⚠️
This is real attack emulation—not a simulation. Your safety and legal protection start here.
Before you proceed, you must complete these steps:
- Build your isolated lab environment – Two Windows VMs with Host-Only networking. No internet during the lab. Payloads must never touch your real network or ISP.
Free video available: Watch the step-by-step lab setup tutorial (no login required) to ensure we are all on the same page. Click here to watch: How to Build a Controlled Lab for This Course
⚠️ AWARENESS: The AI-Generated Photo Threat (2026)
We live in an era where AI image generation tools — including Midjourney, Stable Diffusion, DALL-E, and Sora — can produce photorealistic images of lab environments, running virtual machines, and physical setups that are visually indistinguishable from real ones. A participant could submit a convincing fake lab photo without ever setting up a single VM.
We take academic integrity seriously. To protect the value of this course, your certificate, and your professional reputation, we have replaced static photo submission with a Multi-Layer Verification Protocol that AI cannot fake.
✅ REQUIRED: Multi-Layer Lab Verification Submission
You must submit ALL of the following to rekcahacademy@gmail.com before course access is granted:
- ① Timestamped Physical Photo: Take a photo of your physical setup (laptop/PC screen showing both VMs running) with a handwritten note placed visibly in the frame containing: Your full name, Today's date, The text: "REKCAH ACADEMY — Purple Team Lab". Why: Handwritten elements with specific text are extremely difficult for AI image generators to produce accurately.
- ② VM Manager Interface Screenshot: Take a screenshot of your VirtualBox or VMware application window showing both VMs listed by name with status "Running" visible. Why: This is taken from inside your actual virtualization software — it cannot be externally generated.
- ③ Host-Only Network Configuration Screenshot: Inside each VM, open Network and Sharing Center → Change Adapter Settings (or run ipconfig /all in CMD) and take a screenshot showing the Host-Only adapter with its assigned IP address (e.g., 192.168.56.x range). Why: This is live system-generated data tied to your actual VM network configuration. It cannot be accurately fabricated.
- ④ PowerShell/CMD Verification Output Screenshot: Open PowerShell or Command Prompt inside each VM and run: ipconfig /all. Screenshot the full output showing the Host-Only IP address and adapter name on both machines. Why: Live terminal output with system-specific hostname, adapter identifiers, and IP data is forensically verifiable.
- ⑤ Optional but Strongly Recommended: 15–30 Second Screen Recording: Record a short screen recording (OBS, Xbox Game Bar, or any screen recorder) showing you switching between both running VMs with the VirtualBox/VMware interface visible. Why: A real-time recording demonstrating VM interaction is the highest-confidence verification method and is essentially impossible to fake convincingly with current AI tools.
- Sign and return the Participant Acknowledgment Form – Download the Participant Acknowledgment Form (PDF) – Print, sign in blue pen, and send a clear photo or scan to rekcahacademy@gmail.com.
Updated Submission Checklist:
✔ Signed Participant Acknowledgment Form (blue ink) — Download here
✔ Timestamped physical photo with handwritten name/date card
✔ VM Manager screenshot showing both VMs in "Running" state
✔ Host-Only network adapter screenshot (from inside each VM)
✔ ipconfig /all CMD/PowerShell output from both VMs
✔ (Optional) 15–30 second screen recording of live VM session
Email all to: rekcahacademy@gmail.com
No course access will be granted until all required items above are verified. This process protects YOU legally, academically, and professionally.
Course Overview: Purple Team Lab File Masquerading and RAT Emulation
PURPLE TEAM: MASTER BOTH WORLDS
Purple Team is the fusion of Red Team (Attack) and Blue Team (Defense). This course delivers both perspectives, empowering you to think like an attacker while building defender-level detection skills.
[RED]Red Team
Attack simulation, payload creation, stealth techniques, covert access
[BLUE]Blue Team
Network analysis, process auditing, forensic inspection, threat detection
[PURPLE]Purple Team
Both worlds combined stronger defense through attack understanding
WINDOWS NATIVE NO KALI LINUX REQUIRED
This course is built entirely on Windows 11 Pro 25H2 using native tools: PowerShell, Python, and custom-built scripts. No Linux virtual machine or Kali Linux needed. All tools used in this course are crafted by the author from the ground up, giving you full control over the attack and defense simulation in a completely controlled lab environment. You learn exactly how the techniques work without relying on third-party tools.
Document Title: RTL-DOC-300-v1.0: Purple Team Lab - File Masquerading, Steganography and Remote Access Trojan RAT Emulation
Author: Antonio June Vevia Jr., Cybersecurity Instructor
Version: 1.0
Platform: Windows 11 Pro 25H2 | PowerShell | Python | Author-Crafted Tools
Classification: PURPLE TEAM TRAINING ATTACK AND DEFENSE
This is a comprehensive, hands-on training module designed for cybersecurity professionals who want to master one of the most deceptive attack vectors in the modern threat landscape: payload delivery via file masquerading. This course goes beyond theory, providing a structured, lab-based environment where students learn both Red Team attack techniques and Blue Team detection strategies the essence of Purple Team training.
The course meticulously guides participants through the entire lifecycle of a file masquerading attack, from creating a malicious payload to establishing covert remote access, while simultaneously teaching the forensic detection skills needed to identify and stop such threats. All exercises are performed using Windows 11 Pro 25H2 with PowerShell, Python, and custom tools built by the instructor giving you complete visibility and control over every step.
What Students Will Gain Both Red and Blue Skills
RED TEAM Attack Skills
Students will learn to think like an adversary and simulate real-world attacks:
- Master Payload Masquerading Mechanics: Understand how attackers use file binders, Self-Extracting Archives (SFX), and icon spoofing to disguise malicious executables as harmless files like images.
- Build Functional Offensive Tools: Create a PowerShell Reverse Shell payload from scratch and compile it into an executable, simulating a real-world Remote Access Trojan (RAT).
- Execute a Complete Attack Simulation: Follow a step-by-step process to bind a payload to a legitimate image, spoof its file extension and icon, and deliver it via a simulated social engineering scenario.
- Establish Covert Remote Access: Use the payload to establish a reverse shell connection and leverage Windows administrative shares (C$ share) for silent, remote file system access.
BLUE TEAM Defense Skills
Students will learn to detect, analyze, and respond to active compromises:
- Network Analysis: Use netstat to identify suspicious established connections on critical ports.
- Process Auditing: Use Process Hacker and Sysinternals tools to spot anomalous process trees, such as an image viewer spawning PowerShell.
- Forensic Inspection: Enable file extension display in Windows Explorer to reveal the true nature of masqueraded files.
- Implement Mandatory Cleanup: Execute proper post-engagement cleanup to remove all payloads and artifacts a critical real-world skill.
- ✓ Legal, Ethical & Professional Standards — 2026 Edition
① Clarification on RAT Emulation — Non-Weaponized by Design
All offensive tools created in this course — including the PowerShell Reverse Shell — are non-weaponized, purpose-built training scripts crafted by the instructor from scratch. They are engineered exclusively for operation within the isolated lab environment and do not connect to any external Command & Control (C2) infrastructure, remote server, or internet-facing endpoint. These tools cease to function the moment they leave the controlled lab boundary. This course does not produce production-grade malware. Any misuse outside the lab constitutes a criminal act under applicable law.
- ✓ ② Windows Defender & Antivirus Guidance for Lab Use
Windows 11 Pro 25H2 ships with Microsoft Defender Antivirus and Microsoft Defender for Endpoint (MDE), which will actively detect and quarantine the PowerShell Reverse Shell and SFX payloads used in this lab — even within an isolated VM. This is expected and normal behavior. Participants are guided within the course to temporarily disable Windows Defender on the lab VMs only, for the duration of the exercise. Re-enabling Defender and running a full scan is a mandatory step in the cleanup phase (Phase 6). Never disable antivirus on any production, corporate, or internet-connected machine under any circumstances.
- ✓ ③ Absolute Prohibition on Use Outside the Lab
The techniques taught in this course — including payload creation, reverse shell deployment, file masquerading, and SMB share access — must never be executed on any system, network, or device outside your personally owned, isolated lab environment. This explicitly includes: home routers, ISP-connected networks, corporate or organizational networks, cloud instances, shared hosting environments, and any device belonging to another person or entity. Doing so constitutes a criminal offense under:
Oman Cybercrime Law — Royal Decree No. 12/2011 (unauthorized access, malware deployment, remote infiltration)
Oman Personal Data Protection Law — Royal Decree No. 6/2022
Telecom Regulatory Authority (TRA) of Oman regulations
Computer Fraud and Abuse Act — CFAA (USA)
Computer Misuse Act 1990 (UK)
UAE Federal Cybercrime Law — Federal Decree-Law No. 34 of 2021 (applicable to GCC participants)
NCA Cybersecurity Framework (Saudi Arabia) (applicable to KSA participants)
Potential consequences include criminal prosecution, imprisonment, civil liability, professional certification revocation, and a permanent criminal record.
- ✓ ④ Professional Documentation & 2026 Compliance Standards
Participants are trained to document lab findings using a structured report format aligned with ISO/IEC 27001:2022 information security management standards and the MITRE ATT&CK Framework (v15, 2025). The course maps all attack and defense exercises to current ATT&CK technique IDs: T1036 (Masquerading), T1059.001 (PowerShell), T1021.002 (SMB/Admin Shares), and T1566 (Phishing/Delivery). Professional documentation is not optional — it is a mandatory deliverable that transforms your lab exercise into a portfolio-ready artifact valued by SOC teams, penetration testing firms, and cybersecurity hiring managers across the GCC and globally.
Why the Original Document is an Essential Investment
The knowledge you have accessed is a preview. The complete, original document authored by Antonio June Vevia Jr. is a meticulously crafted training asset that provides the full, uninterrupted value of this Purple Team learning experience.
Here is what you will get in the full original document that makes it an indispensable resource:
- ▶ Complete, Step-by-Step Instructions: Full detailed walkthroughs for every phase, including precise commands, configuration screenshots, and exact syntax. No guesswork.
- ▶ High-Fidelity Screenshots and Visual Guides: Critical visuals for WinRAR SFX setup, icon spoofing, netstat detection, and process tree analysis. See exactly what success looks like.
- ▶ A Complete Troubleshooting Guide: Comprehensive table of common issues and precise solutions. Saves hours of frustration.
- ▶ A Formal Assessment Rubric and Test Case Matrix: TC-001 to TC-011 objectives and rubric to gauge your proficiency level. Transforms the lab into a quantifiable skill-building session.
- ▶ All Required Forms and Templates: Participant Acknowledgment Form, Approval and Signatures sections. Practical documentation for real-world authorized testing.
- ▶ In-Depth Legal Framework and Compliance Checklist: Detailed table of applicable laws, Oman-specific legal considerations, and compliance checklist. Learn professional responsibilities.
- ▶ A Certificate of Completion: Formal certificate to validate your skills and dedication to professional development.
Applicable Cyber Laws and Disclaimers
This training is governed by a strict legal and ethical framework. All students must acknowledge and agree to the following:
- Unauthorized use may violate: Computer Fraud and Abuse Act (CFAA - USA), GDPR (EU), Computer Misuse Act 1990 (UK), Cybercrime Prevention Act (Philippines), and Oman Cybercrime Law.
- Potential Consequences: Criminal prosecution, imprisonment, civil lawsuits, professional certification revocation, employment termination, and a permanent criminal record.
- Core Agreements: You will only test against systems you own or have explicit written authorization for. You will delete all payloads and lab artifacts immediately after the exercise. This training does not grant legal immunity.
Oman-Specific Legal Considerations: Participants in Oman must be aware that unauthorized access, malware deployment, and remote access without authorization are criminal offenses under Royal Decree No. 12/2011, punishable by imprisonment and fines. All activities must also comply with the Personal Data Protection Law and Telecom Regulatory Authority (TRA) regulations.
COMPLETE PURPLE TEAM DOCUMENTATION
LAB Manual and Certificate
Available only to students who have completed the course requirements
OMR 35
Original Document with PPT (PDF)
Personalized with your name • Licensed for individual use
OMR 20
Certificate (PDF)
High-quality image • Signed by instructor • Delivered to your Inbox
OMR 50
Bundle: PDF + Certificate
Complete your portfolio with both
The original document is watermarked with your name and licensed for personal use only. Redistribution is prohibited.
EARN YOUR DIGITAL CERTIFICATE
Upon completion of this course and successfully passing all quizzes, you can avail a digital certificate of completion from Rekcah Academy. This certificate validates your Purple Team skills and is perfect for your LinkedIn profile, resume, or professional portfolio.
To purchase the original document, contact me directly:
Email: rekcahacademy@gmail.com
I will provide you with the bank transfer details to complete your purchase. After confirmation, you will receive the complete, unabridged document, empowering you to build, simulate, and defend like a true Purple Team professional.
For the certificate: complete the course and quizzes, then contact me to arrange payment and delivery.
Stay curious. Stay ethical. Stay secure.