Windows Exploits and Forensics: Post Exploitation

IT Security    |    Expert
  • 14 videos | 1h 23m 7s
  • Includes Assessment
  • Earns a Badge
Rating 2.0 of 1 users Rating 2.0 of 1 users (1)
As a penetration tester, it's vital that you are familiar with advanced methods of conducting offensive security operations against Windows environments. In this course, you'll learn to recognize common post exploitation activities within a Windows environment and how to configure an advanced persistent threat. You'll start by learning how to escalate privileges, use a DLL injection attack, pivot between systems, and crack user credentials. You'll then examine how to use PowerView to enumerate information and use BloodHound to 'walk the dog' and gain domain admin privileges. Finally, you'll learn how to clean up post attack to cover your tracks, create an advanced persistent threat, and use a ransomware attack to lock a system.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize various user levels and methods of privilege escalation within windows
    Conduct a basic privilege escalation on a windows machine
    Use a dll injection to escalate user privileges on a windows machine
    Describe the concept of pivoting within a windows environment and typical end goals
    Use crackmapexec to steal user credentials from a windows machine
    Use powerview to enumerate information from an exploited windows machine in order to pivot the attack
  • Use bloodhound to 'walk the dog', identifying active directory security issues and gaining domain admin privileges
    Recognize cleanup methods used post exploitation to hide your tracks
    Perform post attack cleanup tasks
    Recognize what an advanced persistent threat (apt) is and methods used to configure them
    Configure an apt on a system after exploitation
    Use a ransomware attack as a quick method to clean up post attack
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 7s
  • 7m 54s
  • Locked
    3.  Conducting a Basic Privilege Escalation
    6m 25s
  • Locked
    4.  Using the DLL Injection
    8m 7s
  • Locked
    5.  Pivot between Hosts
    7m 14s
  • Locked
    6.  Stealing User Credentials
    7m 17s
  • Locked
    7.  Using PowerView to Enumerate Information
    6m 45s
  • Locked
    8.  Using BloodHound to Gain Admin Privileges
    4m 56s
  • Locked
    9.  Cleanup Methods to Hide Your Tracks
    7m 13s
  • Locked
    10.  Cleaning up Post Attack
    5m 37s
  • Locked
    11.  APT and Configuration Methods
    6m 26s
  • Locked
    12.  Configuring APT after Exploitation
    6m 19s
  • Locked
    13.  Using the Nuclear Option to Clean up Post Attack
    6m 42s
  • Locked
    14.  Course Summary
    1m 7s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 91 users Rating 4.4 of 91 users (91)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.5 of 33 users Rating 4.5 of 33 users (33)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.5 of 434 users Rating 4.5 of 434 users (434)
Rating 4.5 of 27188 users Rating 4.5 of 27188 users (27188)