Windows Exploits and Forensics: SMB & PsExec

IT Security
  • 15 Videos | 1h 11m 36s
  • Includes Assessment
  • Earns a Badge
When carrying out security operations in a Windows environment, you need to know what kind of attacks, exploits, and vulnerabilities to look out for. This course covers two of the most common services used to attack a Windows-based network - SMB and PsExec - along with some popular attack methodologies. You'll start by examining SMB permissions and default settings. You'll then explore tools to enumerate SMB shares and data. Next, you'll investigate how to identify SMB vulnerabilities and recognize SMB attacks. You'll then conduct different SMB exploits, including brute force and denial of service attacks. You'll move on to outline how PsExec works and use it to execute remote commands. Finally, you'll practice exploiting PsExec using various tools, including the EternalBlue exploit.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    outline how SMB works and how permissions are set
    list various tools and techniques used to enumerate SMB
    enumerate SMB information from an active machine
    outline how to identify potential vulnerabilities in SMB
    outline various methods of attacking SMB
    conduct a brute force attack against an SMB service
    conduct a denial of service attack on the SMB service
  • exploit a system to gain a reverse shell on a Windows machine
    define what PsExec is and describe how it works
    use PsExec to execute commands on a remote machine
    use Mimikatz to "pass the hash" and steal logon credentials
    describe the background of the EternalBlue exploit and outline how it works on Windows systems
    conduct an attack on a system using EternalBlue
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 41s
    UP NEXT
  • Playable
    2. 
    SMB Permissions and Defaults
    5m
  • Locked
    3. 
    SMB Enumeration
    3m 45s
  • Locked
    4. 
    Enumerating SMB Shares
    8m 7s
  • Locked
    5. 
    Identifying Vulnerabilities in SMB
    3m 55s
  • Locked
    6. 
    SMB Attack Methods
    2m 16s
  • Locked
    7. 
    Conducting an SMB Brute Force Attack
    2m 49s
  • Locked
    8. 
    Conducting an SMB Denial of Service
    5m 35s
  • Locked
    9. 
    Exploiting a System Using SMB Reverse Shell
    4m 20s
  • Locked
    10. 
    How the PsExec Utility Works
    2m 19s
  • Locked
    11. 
    Executing Remote Commands with PsTools
    5m 56s
  • Locked
    12. 
    Executing a Pass the Hash Attack with Mimikatz
    9m 47s
  • Locked
    13. 
    A Background to the EternalBlue Exploit
    5m 12s
  • Locked
    14. 
    Using the EternalBlue Vulnerability to Attack
    2m 54s
  • Locked
    15. 
    Course Summary
    1m 31s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 5 Likes 5  
Likes 4 Likes 4