Windows Exploits and Forensics: Legacy Systems & Third Party Applications

IT Security    |    Intermediate
  • 12 Videos | 1h 2m 14s
  • Includes Assessment
  • Earns a Badge
Likes 1 Likes 1
When an organization uses systems that are no longer serviced and supported and therefore, do not receive security updates, they expose themselves to serious security attacks. To ensure a healthy network ecosystem, security operations personnel must be aware of the vulnerabilities these systems are exposed to. In this course, you'll explore how to conduct offensive security operations against legacy Windows-based systems. You'll learn to recognize older versions of Windows, identify common exploits for these older versions, and scan Server 2008 for vulnerabilities. You'll then learn how to enumerate Server 2008, exploit legacy systems, and gain a reverse shell on a legacy system. You'll then learn how to recognize common third-party applications and vulnerabilities and how to exploit them. Finally, you'll learn how to identify and avoid a honeypot.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    identify common attacks against legacy Windows host-based machines
    identify common attacks against legacy Windows Server-based machines
    scan a Windows Server 2008 environment for potential vulnerabilities
    enumerate data from services running on Windows Server 2008 hosts
    run an exploit on a Windows Server 2008-based machine to gain user credentials
  • run an exploit on a Windows-based machine to gain a reverse shell
    list common third-party applications used in Windows environments
    outline how to find vulnerabilities for third-party applications
    exploit a third-party application and gain access to a system
    recognize a honeypot and how to avoid falling into their trap
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 52s
    UP NEXT
  • Playable
    2. 
    Common Attacks on Windows Hosts
    5m 47s
  • Locked
    3. 
    Common Attacks on Windows Servers
    6m 9s
  • Locked
    4. 
    Scanning for Potential Vulnerabilities
    6m 25s
  • Locked
    5. 
    Enumerating Data from Services
    5m 5s
  • Locked
    6. 
    Running an Exploit to Gain Credentials
    3m 44s
  • Locked
    7. 
    Running an Exploit to Gain a Reverse Shell
    4m 21s
  • Locked
    8. 
    Common Third-party Applications in Windows
    5m 45s
  • Locked
    9. 
    Finding Vulnerabilities for Third-party Applications
    7m 43s
  • Locked
    10. 
    Exploiting Third-party Applications in Windows
    5m 13s
  • Locked
    11. 
    Avoiding Honeypots
    3m 35s
  • Locked
    12. 
    Course Summary
    1m 37s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE