09-30-2023, 09:44 PM
Windows Local Privilege Escalation Mastery - Red Team
Published 8/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.38 GB | Duration: 6h 41m
Local Privilege Escalation Windows For Pentesters and Read Team
What you'll learn
Windows Local Privilege Escalation Manually
Windows Local Privilege Escalation With Metasploit
How to Exploit Active Directory From Windows
Windows Local Privilege Escalation With Evil-WinRM
Windows Local Privilege Escalation With Empire
How to Use Metasploit to Exploit Active Directory
How to Use Empire to Exploit Active Directory
How to Use Evil-WinRM to Exploit Active Directory
How to Use CrackMapExec to Exploit Active Directory
PowerView PowerShell Module
Requirements
Windows Server Experience
Knowledge of Active Directory
Description
The Windows Privilege Escalation Mastery course is a comprehensive and hands-on training program designed for cybersecurity professionals, system administrators, penetration testers, and anyone seeking to enhance their skills in identifying and exploiting privilege escalation vulnerabilities within Windows environments. This immersive course will equip participants with in-depth knowledge and practical techniques to escalate privileges on Windows systems securely and efficiently.Key Learning Objectives:Understanding Windows Privilege Models: Gain insights into Windows privilege models, user permissions, and the underlying mechanisms that govern user access rights.Exploiting Vulnerabilities: Learn how to identify and exploit common privilege escalation vulnerabilities in Windows, including misconfigurations, weak file permissions, insecure services, and more.Enumeration Techniques: Master the art of enumerating users, groups, services, and system information to identify potential privilege escalation opportunities.Kernel Exploits: Explore advanced techniques to escalate privileges through kernel-level exploits, understanding Windows kernel architecture, and bypassing security mechanisms.Post-Exploitation Strategies: Learn post-exploitation methodologies to maintain persistent access and cover tracks after privilege escalation.Course Features:Expert Instructors: Learn from seasoned cybersecurity professionals with extensive experience in penetration testing and Windows security.Cutting-Edge Tools: Familiarize yourself with the latest tools and utilities used for Windows privilege escalation.Practical Tips and Best Practices: Get insider tips, tricks, and best practices to conduct privilege escalation assessments effectively and efficiently.
Overview
Section 1: Privilege Escalation - Manually
Lecture 1 Local User & Group Enumeration
Lecture 2 Network Enumeration
Lecture 3 Antivirus & Detections
Lecture 4 Hunting Passwords
Lecture 5 Tools
Lecture 6 Windows Version and Configuration
Lecture 7 Sherlock & Watson
Lecture 8 CVE-2019-1388
Lecture 9 Schedule Task Privilege Escalation
Lecture 10 Unquoted Service Path
Lecture 11 SEImpersonate
Lecture 12 ZeroLogon CVE-2020-1472
Lecture 13 Windows - Privilege Escalation and Local Enumeartion Cheat Sheet
Lecture 14 Recommended Windows Hack The Box machines
Section 2: Local Privilege Escalation With EvilWinRM
Lecture 15 Basic commands
Lecture 16 Upload and Download
Lecture 17 PowerView
Lecture 18 Build SharpSploit - Enumeration
Lecture 19 User, Group, and Network
Lecture 20 Tools - Local Priv Esc
Section 3: Windows Local Privilege Escalation With Empire
Lecture 21 Basics and Installing
Lecture 22 Getting a Shell + CME + Powershell
Lecture 23 Getting a shell + Evil-WinRM + Bat File
Lecture 24 Privilege Escalation 1 - ReverShell With Unquoted Path
Lecture 25 Privilege Escalation 2 - Stager with NT/SYSTEM
Lecture 26 Privilege Escalation 3
Lecture 27 Elevated with Empire - Mimikatz and pth
Lecture 28 Pth + dcsync + dcshadow -1
Section 4: Windows Local Privilege Escalation With Metasploit
Lecture 29 Intro
Lecture 30 Exploiting Ethernal Blue Metasploit
Lecture 31 Enumeration 1 - User, Groups, Computers
Lecture 32 Enumeration 2 - Arp, Tokens, Patches
Lecture 33 Enumeration 3 - Shares, SMB, and More
Lecture 34 Exploit Suggestor
Lecture 35 Exploit Suggestor 2
Lecture 36 Back door add user
Lecture 37 HashDump With Metasploit
Lecture 38 Lateral Movement - PTH With metasploit
Lecture 39 Lateral Movement To DC - Metasploit
Lecture 40 Steal_Token and Dumping All Hashes - Metasploit
Lecture 41 DcSync With Metasploit
Lecture 42 Golden Ticket With Metasploit
Lecture 43 BACKDOOR METERPRETER SERVICE 1
Lecture 44 BACKDOOR METERPRETER SERVICE 2
Students who would love to become a Windows Local Privilege Escalation Expert,Students who would love a Job as a Red Team,Students who would love to learn how to Attack the Windows OS
Windows Local Privilege Escalation Mastery. Red Team (3.38 GB)
KatFile Link(s)
RapidGator Link(s)