Windows Exploits and Forensics: Legacy Systems & Third Party Applications

IT Security    |    Intermediate
  • 12 videos | 57m 14s
  • Includes Assessment
  • Earns a Badge
Likes 1 Likes 1
When an organization uses systems that are no longer serviced and supported and therefore, do not receive security updates, they expose themselves to serious security attacks. To ensure a healthy network ecosystem, security operations personnel must be aware of the vulnerabilities these systems are exposed to. In this course, you'll explore how to conduct offensive security operations against legacy Windows-based systems. You'll learn to recognize older versions of Windows, identify common exploits for these older versions, and scan Server 2008 for vulnerabilities. You'll then learn how to enumerate Server 2008, exploit legacy systems, and gain a reverse shell on a legacy system. You'll then learn how to recognize common third-party applications and vulnerabilities and how to exploit them. Finally, you'll learn how to identify and avoid a honeypot.


  • discover the key concepts covered in this course
    identify common attacks against legacy Windows host-based machines
    identify common attacks against legacy Windows Server-based machines
    scan a Windows Server 2008 environment for potential vulnerabilities
    enumerate data from services running on Windows Server 2008 hosts
    run an exploit on a Windows Server 2008-based machine to gain user credentials
  • run an exploit on a Windows-based machine to gain a reverse shell
    list common third-party applications used in Windows environments
    outline how to find vulnerabilities for third-party applications
    exploit a third-party application and gain access to a system
    recognize a honeypot and how to avoid falling into their trap
    summarize the key concepts covered in this course


  • 1m 52s
  • 5m 47s
  • Locked
    3.  Common Attacks on Windows Servers
    6m 9s
  • Locked
    4.  Scanning for Potential Vulnerabilities
    6m 25s
  • Locked
    5.  Enumerating Data from Services
    5m 5s
  • Locked
    6.  Running an Exploit to Gain Credentials
    3m 44s
  • Locked
    7.  Running an Exploit to Gain a Reverse Shell
    4m 21s
  • Locked
    8.  Common Third-party Applications in Windows
    5m 45s
  • Locked
    9.  Finding Vulnerabilities for Third-party Applications
    7m 43s
  • Locked
    10.  Exploiting Third-party Applications in Windows
    5m 13s
  • Locked
    11.  Avoiding Honeypots
    3m 35s
  • Locked
    12.  Course Summary
    1m 37s


Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.