Windows Exploits and Forensics: FTP, RDP, & Other Services
IT Security
| Intermediate
- 14 videos | 1h 12m 9s
- Includes Assessment
- Earns a Badge
To protect an operating system, you must first know how to exploit it. This course covers some of the standard Windows services that have known exploits available for them, which can be used in offensive security operations against a Windows environment. You'll start by enumerating data from a Windows-based FTP server before practicing methods used to attack FTP services. You'll then learn how to attack IIS-based systems. Next, you'll examine the RPD protocol and learn methods of attacking the Windows RDP service. Finally, you'll investigate how WMI works and learn to exploit WMI on a Windows-based machine. This course involves conducting brute force attacks, reverse shells, and using the BlueKeep security vulnerability.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courserecognize how to exploit common Windows services, such as FTP, RDP, and othersenumerate data from an FTPoutline the various methods of attacking FTP servicesconduct a brute force attack against an FTP serverdiscover IIS and how it relates to Windows and FTP Clientsuse ASP to gain a reverse shell on a Windows machine
-
outline what RDP is and how it works within a Windows environmentstate various methods of attacking the Windows RDP serviceenumerate a Windows machine using the RDP serviceexploit an RDP system using the BlueKeep vulnerabilitydescribe the features of WMI and how it worksexploit WMI on a Windows-based systemsummarize the key concepts covered in this course
IN THIS COURSE
-
54s
-
6m 18s
-
5m 48s
-
4m 26s
-
5m 31s
-
4m 12s
-
8m 37s
-
6m 11s
-
5m 11s
-
5m 31s
-
5m 43s
-
5m 16s
-
7m 21s
-
1m 11s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.