Windows Exploits and Forensics: FTP, RDP, & Other Services

IT Security
  • 14 Videos | 1h 18m 9s
  • Includes Assessment
  • Earns a Badge
To protect an operating system, you must first know how to exploit it. This course covers some of the standard Windows services that have known exploits available for them, which can be used in offensive security operations against a Windows environment. You'll start by enumerating data from a Windows-based FTP server before practicing methods used to attack FTP services. You'll then learn how to attack IIS-based systems. Next, you'll examine the RPD protocol and learn methods of attacking the Windows RDP service. Finally, you'll investigate how WMI works and learn to exploit WMI on a Windows-based machine. This course involves conducting brute force attacks, reverse shells, and using the BlueKeep security vulnerability.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    recognize how to exploit common Windows services, such as FTP, RDP, and others
    enumerate data from an FTP
    outline the various methods of attacking FTP services
    conduct a brute force attack against an FTP server
    discover IIS and how it relates to Windows and FTP Clients
    use ASP to gain a reverse shell on a Windows machine
  • outline what RDP is and how it works within a Windows environment
    state various methods of attacking the Windows RDP service
    enumerate a Windows machine using the RDP service
    exploit an RDP system using the BlueKeep vulnerability
    describe the features of WMI and how it works
    exploit WMI on a Windows-based system
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    54s
    UP NEXT
  • Playable
    2. 
    Windows Service Exploitation
    6m 18s
  • Locked
    3. 
    Enumerating Data from FTP
    5m 48s
  • Locked
    4. 
    FTP Attack Methods
    4m 26s
  • Locked
    5. 
    Conducting a Brute Force Attack on an FTP Server
    5m 31s
  • Locked
    6. 
    IIS with Windows and FTP Clients
    4m 12s
  • Locked
    7. 
    FTP/IIS Reverse Shell
    8m 37s
  • Locked
    8. 
    RDP in a Windows Environment
    6m 11s
  • Locked
    9. 
    RDP Attack Methods
    5m 11s
  • Locked
    10. 
    Enumerating Using RDP
    5m 31s
  • Locked
    11. 
    Exploiting an RDP system Using BlueKeep
    5m 43s
  • Locked
    12. 
    Working with WMI
    5m 16s
  • Locked
    13. 
    Exploiting WMI on a Windows-based System
    7m 21s
  • Locked
    14. 
    Course Summary
    1m 11s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.