Companies Home Search Profile

Windows Local Privilege Escalation Mastery - Red Team

Focused View

Security Gurus

6:40:53

62 View
  • 1. Local User & Group Enumeration.mp4
    16:10
  • 2. Network Enumeration.mp4
    14:14
  • 3. Antivirus & Detections.mp4
    13:21
  • 4. Hunting Passwords.mp4
    11:48
  • 5. Tools.mp4
    12:05
  • 6. Windows Version and Configuration.mp4
    08:39
  • 7. Sherlock & Watson.mp4
    07:10
  • 8. CVE-2019-1388.mp4
    07:37
  • 9. Schedule Task Privilege Escalation.mp4
    16:58
  • 10. Unquoted Service Path.mp4
    19:03
  • 11. SEImpersonate.mp4
    10:19
  • 12. ZeroLogon CVE-2020-1472.mp4
    07:12
  • 13. Windows - Privilege Escalation and Local Enumeartion Cheat Sheet.html
  • 14. Recommended Windows Hack The Box machines.html
  • 1. Basic commands.mp4
    06:15
  • 2. Upload and Download.mp4
    04:30
  • 3. PowerView.mp4
    07:20
  • 4. Build SharpSploit - Enumeration.mp4
    06:11
  • 5. User, Group, and Network.mp4
    00:29
  • 6. Tools - Local Priv Esc.mp4
    01:03
  • 1. Basics and Installing.mp4
    11:41
  • 2. Getting a Shell + CME + Powershell.mp4
    07:10
  • 3. Getting a shell + Evil-WinRM + Bat File.mp4
    11:22
  • 4. Privilege Escalation 1 - ReverShell With Unquoted Path.mp4
    25:33
  • 5. Privilege Escalation 2 - Stager with NTSYSTEM.mp4
    06:04
  • 6. Privilege Escalation 3.mp4
    11:06
  • 7. Elevated with Empire - Mimikatz and pth.mp4
    08:39
  • 8. Pth + dcsync + dcshadow -1.mp4
    08:39
  • 1. Intro.mp4
    12:45
  • 2. Exploiting Ethernal Blue Metasploit.mp4
    09:24
  • 3. Enumeration 1 - User, Groups, Computers.mp4
    12:23
  • 4. Enumeration 2 - Arp, Tokens, Patches.mp4
    11:22
  • 5. Enumeration 3 - Shares, SMB, and More.mp4
    09:47
  • 6. Exploit Suggestor.mp4
    08:51
  • 7. Exploit Suggestor 2.mp4
    10:26
  • 8. Back door add user.mp4
    07:19
  • 9. HashDump With Metasploit.mp4
    06:28
  • 10. Lateral Movement - PTH With metasploit.mp4
    14:40
  • 11. Lateral Movement To DC - Metasploit.mp4
    11:42
  • 12. Steal Token and Dumping All Hashes - Metasploit.mp4
    05:58
  • 13. DcSync With Metasploit.mp4
    04:55
  • 14. Golden Ticket With Metasploit.mp4
    07:17
  • 15. BACKDOOR METERPRETER SERVICE 1.mp4
    05:30
  • 16. BACKDOOR METERPRETER SERVICE 2.mp4
    01:28
  • Description


    Local Privilege Escalation Windows For Pentesters and Read Team

    What You'll Learn?


    • Windows Local Privilege Escalation Manually
    • Windows Local Privilege Escalation With Metasploit
    • How to Exploit Active Directory From Windows
    • Windows Local Privilege Escalation With Evil-WinRM
    • Windows Local Privilege Escalation With Empire
    • How to Use Metasploit to Exploit Active Directory
    • How to Use Empire to Exploit Active Directory
    • How to Use Evil-WinRM to Exploit Active Directory
    • How to Use CrackMapExec to Exploit Active Directory
    • PowerView PowerShell Module

    Who is this for?


  • Students who would love to become a Windows Local Privilege Escalation Expert
  • Students who would love a Job as a Red Team
  • Students who would love to learn how to Attack the Windows OS
  • What You Need to Know?


  • Windows Server Experience
  • Knowledge of Active Directory
  • More details


    Description

    The Windows Privilege Escalation Mastery course is a comprehensive and hands-on training program designed for cybersecurity professionals, system administrators, penetration testers, and anyone seeking to enhance their skills in identifying and exploiting privilege escalation vulnerabilities within Windows environments. This immersive course will equip participants with in-depth knowledge and practical techniques to escalate privileges on Windows systems securely and efficiently.


    Key Learning Objectives:

    1. Understanding Windows Privilege Models: Gain insights into Windows privilege models, user permissions, and the underlying mechanisms that govern user access rights.

    2. Exploiting Vulnerabilities: Learn how to identify and exploit common privilege escalation vulnerabilities in Windows, including misconfigurations, weak file permissions, insecure services, and more.

    3. Enumeration Techniques: Master the art of enumerating users, groups, services, and system information to identify potential privilege escalation opportunities.

    4. Kernel Exploits: Explore advanced techniques to escalate privileges through kernel-level exploits, understanding Windows kernel architecture, and bypassing security mechanisms.

    5. Post-Exploitation Strategies: Learn post-exploitation methodologies to maintain persistent access and cover tracks after privilege escalation.


    Course Features:

    • Expert Instructors: Learn from seasoned cybersecurity professionals with extensive experience in penetration testing and Windows security.

    • Cutting-Edge Tools: Familiarize yourself with the latest tools and utilities used for Windows privilege escalation.

    • Practical Tips and Best Practices: Get insider tips, tricks, and best practices to conduct privilege escalation assessments effectively and efficiently.

    Who this course is for:

    • Students who would love to become a Windows Local Privilege Escalation Expert
    • Students who would love a Job as a Red Team
    • Students who would love to learn how to Attack the Windows OS

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Security Gurus
    Security Gurus
    Instructor's Courses
    I started my journey with the CCNA R&S. After earling about VPNs, I became interested in security and pass the CCNA Security. I started digging more in firewalls and fell in love with Palo Alto Networks Firewall. I like to encrypt packets. BTC. CCNA Routing and CCNP SEC, CCNA SEC tips, labs videos and more! CCNA R&S and CCNA Security Certified and working on my CCNP Security SIMOS
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 42
    • duration 6:40:53
    • Release Date 2023/09/13

    Courses related to Ethical Hacking

    Courses related to Penetration Testing