Register Account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Windows Local Privilege Escalation Mastery. Red Team
#1
[Image: NEi7qa.z08f2eu1nlxz.jpg]

Windows Local Privilege Escalation Mastery - Red Team
Published 8/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.38 GB | Duration: 6h 41m
Local Privilege Escalation Windows For Pentesters and Read Team

What you'll learn

Windows Local Privilege Escalation Manually

Windows Local Privilege Escalation With Metasploit

How to Exploit Active Directory From Windows

Windows Local Privilege Escalation With Evil-WinRM

Windows Local Privilege Escalation With Empire

How to Use Metasploit to Exploit Active Directory

How to Use Empire to Exploit Active Directory

How to Use Evil-WinRM to Exploit Active Directory

How to Use CrackMapExec to Exploit Active Directory

PowerView PowerShell Module

Requirements

Windows Server Experience

Knowledge of Active Directory

Description

The Windows Privilege Escalation Mastery course is a comprehensive and hands-on training program designed for cybersecurity professionals, system administrators, penetration testers, and anyone seeking to enhance their skills in identifying and exploiting privilege escalation vulnerabilities within Windows environments. This immersive course will equip participants with in-depth knowledge and practical techniques to escalate privileges on Windows systems securely and efficiently.Key Learning Objectives:Understanding Windows Privilege Models: Gain insights into Windows privilege models, user permissions, and the underlying mechanisms that govern user access rights.Exploiting Vulnerabilities: Learn how to identify and exploit common privilege escalation vulnerabilities in Windows, including misconfigurations, weak file permissions, insecure services, and more.Enumeration Techniques: Master the art of enumerating users, groups, services, and system information to identify potential privilege escalation opportunities.Kernel Exploits: Explore advanced techniques to escalate privileges through kernel-level exploits, understanding Windows kernel architecture, and bypassing security mechanisms.Post-Exploitation Strategies: Learn post-exploitation methodologies to maintain persistent access and cover tracks after privilege escalation.Course Features:Expert Instructors: Learn from seasoned cybersecurity professionals with extensive experience in penetration testing and Windows security.Cutting-Edge Tools: Familiarize yourself with the latest tools and utilities used for Windows privilege escalation.Practical Tips and Best Practices: Get insider tips, tricks, and best practices to conduct privilege escalation assessments effectively and efficiently.

Overview

Section 1: Privilege Escalation - Manually

Lecture 1 Local User & Group Enumeration

Lecture 2 Network Enumeration

Lecture 3 Antivirus & Detections

Lecture 4 Hunting Passwords

Lecture 5 Tools

Lecture 6 Windows Version and Configuration

Lecture 7 Sherlock & Watson

Lecture 8 CVE-2019-1388

Lecture 9 Schedule Task Privilege Escalation

Lecture 10 Unquoted Service Path

Lecture 11 SEImpersonate

Lecture 12 ZeroLogon CVE-2020-1472

Lecture 13 Windows - Privilege Escalation and Local Enumeartion Cheat Sheet

Lecture 14 Recommended Windows Hack The Box machines

Section 2: Local Privilege Escalation With EvilWinRM

Lecture 15 Basic commands

Lecture 16 Upload and Download

Lecture 17 PowerView

Lecture 18 Build SharpSploit - Enumeration

Lecture 19 User, Group, and Network

Lecture 20 Tools - Local Priv Esc

Section 3: Windows Local Privilege Escalation With Empire

Lecture 21 Basics and Installing

Lecture 22 Getting a Shell + CME + Powershell

Lecture 23 Getting a shell + Evil-WinRM + Bat File

Lecture 24 Privilege Escalation 1 - ReverShell With Unquoted Path

Lecture 25 Privilege Escalation 2 - Stager with NT/SYSTEM

Lecture 26 Privilege Escalation 3

Lecture 27 Elevated with Empire - Mimikatz and pth

Lecture 28 Pth + dcsync + dcshadow -1

Section 4: Windows Local Privilege Escalation With Metasploit

Lecture 29 Intro

Lecture 30 Exploiting Ethernal Blue Metasploit

Lecture 31 Enumeration 1 - User, Groups, Computers

Lecture 32 Enumeration 2 - Arp, Tokens, Patches

Lecture 33 Enumeration 3 - Shares, SMB, and More

Lecture 34 Exploit Suggestor

Lecture 35 Exploit Suggestor 2

Lecture 36 Back door add user

Lecture 37 HashDump With Metasploit

Lecture 38 Lateral Movement - PTH With metasploit

Lecture 39 Lateral Movement To DC - Metasploit

Lecture 40 Steal_Token and Dumping All Hashes - Metasploit

Lecture 41 DcSync With Metasploit

Lecture 42 Golden Ticket With Metasploit

Lecture 43 BACKDOOR METERPRETER SERVICE 1

Lecture 44 BACKDOOR METERPRETER SERVICE 2

Students who would love to become a Windows Local Privilege Escalation Expert,Students who would love a Job as a Red Team,Students who would love to learn how to Attack the Windows OS

Windows Local Privilege Escalation Mastery. Red Team (3.38 GB)

KatFile Link(s)

[To see links please register or login]

RapidGator Link(s)

[To see links please register or login]

[Image: signature.png]
Reply


Download Now



Forum Jump:


Users browsing this thread:
2 Guest(s)

Download Now