Windows Exploits and Forensics: Post Exploitation
IT Security
| Expert
- 14 Videos | 1h 23m 7s
- Includes Assessment
- Earns a Badge
As a penetration tester, it's vital that you are familiar with advanced methods of conducting offensive security operations against Windows environments. In this course, you'll learn to recognize common post exploitation activities within a Windows environment and how to configure an advanced persistent threat. You'll start by learning how to escalate privileges, use a DLL injection attack, pivot between systems, and crack user credentials. You'll then examine how to use PowerView to enumerate information and use BloodHound to 'walk the dog' and gain domain admin privileges. Finally, you'll learn how to clean up post attack to cover your tracks, create an advanced persistent threat, and use a ransomware attack to lock a system.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courserecognize various user levels and methods of privilege escalation within Windowsconduct a basic privilege escalation on a Windows machineuse a DLL injection to escalate user privileges on a Windows machinedescribe the concept of pivoting within a Windows environment and typical end goalsuse CrackMapExec to steal user credentials from a Windows machineuse PowerView to enumerate information from an exploited Windows machine in order to pivot the attack
-
use BloodHound to 'walk the dog', identifying Active Directory security issues and gaining domain admin privilegesrecognize cleanup methods used post exploitation to hide your tracksperform post attack cleanup tasksrecognize what an advanced persistent threat (APT) is and methods used to configure themconfigure an APT on a system after exploitationuse a ransomware attack as a quick method to clean up post attacksummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 7sUP NEXT
-
2.Privilege Escalation Methods7m 54s
-
3.Conducting a Basic Privilege Escalation6m 25s
-
4.Using the DLL Injection8m 7s
-
5.Pivot between Hosts7m 14s
-
6.Stealing User Credentials7m 17s
-
7.Using PowerView to Enumerate Information6m 45s
-
8.Using BloodHound to Gain Admin Privileges4m 56s
-
9.Cleanup Methods to Hide Your Tracks7m 13s
-
10.Cleaning up Post Attack5m 37s
-
11.APT and Configuration Methods6m 26s
-
12.Configuring APT after Exploitation6m 19s
-
13.Using the Nuclear Option to Clean up Post Attack6m 42s
-
14.Course Summary1m 7s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.