Windows Exploits and Forensics: Post Exploitation

IT Security
  • 14 Videos | 1h 23m 49s
  • Earns a Badge
As a penetration tester, it's vital that you are familiar with advanced methods of conducting offensive security operations against Windows environments. In this course, you’ll learn to recognize common post exploitation activities within a Windows environment and how to configure an advanced persistent threat. You’ll start by learning how to escalate privileges, use a DLL injection attack, pivot between systems, and crack user credentials. You'll then examine how to use PowerView to enumerate information and use BloodHound to 'walk the dog' and gain domain admin privileges. Finally, you'll learn how to clean up post attack to cover your tracks, create an advanced persistent threat, and use a ransomware attack to lock a system.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    recognize various user levels and methods of privilege escalation within Windows
    conduct a basic privilege escalation on a Windows machine
    use a DLL injection to escalate user privileges on a Windows machine
    describe the concept of pivoting within a Windows environment and typical end goals
    use CrackMapExec to steal user credentials from a Windows machine
    use PowerView to enumerate information from an exploited Windows machine in order to pivot the attack
  • use BloodHound to 'walk the dog', identifying Active Directory security issues and gaining domain admin privileges
    recognize cleanup methods used post exploitation to hide your tracks
    perform post attack cleanup tasks
    recognize what an advanced persistent threat (APT) is and methods used to configure them
    configure an APT on a system after exploitation
    use a ransomware attack as a quick method to clean up post attack
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 10s
    UP NEXT
  • Playable
    2. 
    Privilege Escalation Methods
    7m 57s
  • Locked
    3. 
    Conducting a Basic Privilege Escalation
    6m 28s
  • Locked
    4. 
    Using the DLL Injection
    8m 10s
  • Locked
    5. 
    Pivot between Hosts
    7m 17s
  • Locked
    6. 
    Stealing User Credentials
    7m 20s
  • Locked
    7. 
    Using PowerView to Enumerate Information
    6m 48s
  • Locked
    8. 
    Using BloodHound to Gain Admin Privileges
    4m 59s
  • Locked
    9. 
    Cleanup Methods to Hide Your Tracks
    7m 16s
  • Locked
    10. 
    Cleaning up Post Attack
    5m 40s
  • Locked
    11. 
    APT and Configuration Methods
    6m 29s
  • Locked
    12. 
    Configuring APT after Exploitation
    6m 22s
  • Locked
    13. 
    Using the Nuclear Option to Clean up Post Attack
    6m 45s
  • Locked
    14. 
    Course Summary
    1m 10s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.