Windows Exploits and Forensics: Legacy Systems & Third Party Applications
IT Security
| Intermediate
- 12 Videos | 57m 14s
- Includes Assessment
- Earns a Badge
When an organization uses systems that are no longer serviced and supported and therefore, do not receive security updates, they expose themselves to serious security attacks. To ensure a healthy network ecosystem, security operations personnel must be aware of the vulnerabilities these systems are exposed to. In this course, you'll explore how to conduct offensive security operations against legacy Windows-based systems. You'll learn to recognize older versions of Windows, identify common exploits for these older versions, and scan Server 2008 for vulnerabilities. You'll then learn how to enumerate Server 2008, exploit legacy systems, and gain a reverse shell on a legacy system. You'll then learn how to recognize common third-party applications and vulnerabilities and how to exploit them. Finally, you'll learn how to identify and avoid a honeypot.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courseidentify common attacks against legacy Windows host-based machinesidentify common attacks against legacy Windows Server-based machinesscan a Windows Server 2008 environment for potential vulnerabilitiesenumerate data from services running on Windows Server 2008 hostsrun an exploit on a Windows Server 2008-based machine to gain user credentials
-
run an exploit on a Windows-based machine to gain a reverse shelllist common third-party applications used in Windows environmentsoutline how to find vulnerabilities for third-party applicationsexploit a third-party application and gain access to a systemrecognize a honeypot and how to avoid falling into their trapsummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 52sUP NEXT
-
2.Common Attacks on Windows Hosts5m 47s
-
3.Common Attacks on Windows Servers6m 9s
-
4.Scanning for Potential Vulnerabilities6m 25s
-
5.Enumerating Data from Services5m 5s
-
6.Running an Exploit to Gain Credentials3m 44s
-
7.Running an Exploit to Gain a Reverse Shell4m 21s
-
8.Common Third-party Applications in Windows5m 45s
-
9.Finding Vulnerabilities for Third-party Applications7m 43s
-
10.Exploiting Third-party Applications in Windows5m 13s
-
11.Avoiding Honeypots3m 35s
-
12.Course Summary1m 37s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.