Windows Exploits and Forensics: FTP, RDP, & Other Services
IT Security
| Intermediate
- 14 Videos | 1h 12m 9s
- Includes Assessment
- Earns a Badge
To protect an operating system, you must first know how to exploit it. This course covers some of the standard Windows services that have known exploits available for them, which can be used in offensive security operations against a Windows environment. You'll start by enumerating data from a Windows-based FTP server before practicing methods used to attack FTP services. You'll then learn how to attack IIS-based systems. Next, you'll examine the RPD protocol and learn methods of attacking the Windows RDP service. Finally, you'll investigate how WMI works and learn to exploit WMI on a Windows-based machine. This course involves conducting brute force attacks, reverse shells, and using the BlueKeep security vulnerability.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courserecognize how to exploit common Windows services, such as FTP, RDP, and othersenumerate data from an FTPoutline the various methods of attacking FTP servicesconduct a brute force attack against an FTP serverdiscover IIS and how it relates to Windows and FTP Clientsuse ASP to gain a reverse shell on a Windows machine
-
outline what RDP is and how it works within a Windows environmentstate various methods of attacking the Windows RDP serviceenumerate a Windows machine using the RDP serviceexploit an RDP system using the BlueKeep vulnerabilitydescribe the features of WMI and how it worksexploit WMI on a Windows-based systemsummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview54sUP NEXT
-
2.Windows Service Exploitation6m 18s
-
3.Enumerating Data from FTP5m 48s
-
4.FTP Attack Methods4m 26s
-
5.Conducting a Brute Force Attack on an FTP Server5m 31s
-
6.IIS with Windows and FTP Clients4m 12s
-
7.FTP/IIS Reverse Shell8m 37s
-
8.RDP in a Windows Environment6m 11s
-
9.RDP Attack Methods5m 11s
-
10.Enumerating Using RDP5m 31s
-
11.Exploiting an RDP system Using BlueKeep5m 43s
-
12.Working with WMI5m 16s
-
13.Exploiting WMI on a Windows-based System7m 21s
-
14.Course Summary1m 11s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.