![]() |
|
Windows Exploitation: 45 Ethical Hacks & Exploits - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Windows Exploitation: 45 Ethical Hacks & Exploits (/Thread-Windows-Exploitation-45-Ethical-Hacks-Exploits--1125344) |
Windows Exploitation: 45 Ethical Hacks & Exploits - AD-TEAM - 10-05-2025 ![]() Windows Exploitation: 45 Ethical Hacks & Exploits Published 9/2025 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 4.84 GB | Duration: 7h 57m "Hands-On Techniques to Elevate Your Pentesting Skills and Master Windows Vulnerabilities" What you'll learn Essential Windows Pentesting Techniques Reconnaissance & Information Gathering Exploitation & Privilege Escalation Active Directory Attacks Post-Exploitation & Persistence Covering Tracks & Defense Evasion Real-World Pentesting Scenarios Requirements Basic Understanding of Networking - Familiarity with TCP/IP, ports, protocols, and network configurations. Fundamental Knowledge of Windows Operating Systems Basic Pentesting Concepts Familiarity with Security Tools No Programming Experience Required Virtual Lab Setup Description If you already have a foundation in ethical hacking and want to take your skills to the next level, Windows Exploitation: 45 Ethical Hacks & Exploits is the perfect course for you. Designed for intermediate learners, this course bridges the gap between basic penetration testing concepts and advanced exploitation techniques by focusing specifically on the Windows environment-the most widely targeted operating system in the world.You'll work through 45 carefully selected hacks and exploits, each demonstrated step-by-step through video lessons and practical labs. From privilege escalation and persistence methods to misconfigurations, remote access attacks, and post-exploitation strategies, you'll gain real-world skills used by professional penetration testers and red teamers.Each lab is hands-on, guiding you through the process of setting up, attacking, and analyzing vulnerable Windows systems in a safe virtualized environment. Along the way, you'll learn to leverage powerful tools such as Metasploit, PowerShell, WinPEAS, and MSFVenom, and discover how attackers weaponize Windows weaknesses to gain control of machines.By the end of the course, you will:Confidently exploit Windows vulnerabilities across multiple attack vectors.Use scripts and payloads to establish persistence and escalate privileges.Understand common misconfigurations and how they are abused.Develop a workflow for structured pentesting in Windows domains.Build the skills needed to progress toward advanced red teaming and OSCP-level labs.This course is designed for students who have completed beginner-level ethical hacking or pentesting training and are ready to push beyond reconnaissance and scanning into hands-on exploitation and attack execution.If you're serious about becoming a skilled penetration tester, security analyst, or red team operator, this intermediate course will give you the tools, knowledge, and experience to stand out in the cybersecurity field. Overview Section 1: Course Overview Lecture 1 Introduction Section 2: Building Your Lab Envirorment Lecture 2 Installing Oracle VirtualBox on Windows 10_11 Lecture 3 Installing the VirtualBox Extension Pack Lecture 4 Creating a Virtaul Install of Kali Linux Lecture 5 Creating a Virtaul Install of Windows 10 Lecture 6 Creating a Virtual Install of Metasploitable3 (W2k08) Lecture 7 Creating a Virtual install of Server 2016 Section 3: Reconnaissance & Scanning Lecture 8 Introduction to Nmap Basics Lecture 9 Service & OS Detection Using Nmap Lecture 10 Nmap Service and Open Port scan Lecture 11 Nmap Host Detection Lecture 12 Nmap NSE for Windows Services Lecture 13 Installing OpenVAS Using Docker Lecture 14 Vulnerability Scanning with OpenVAS Lecture 15 Using Shodan to Find Exposed Systems Lecture 16 Creating A Bash Script For Scanning Vulnerable Ports Section 4: Enumeration & Information Gathering Lecture 17 Banner Grabbing & Service Fingerprinting Lecture 18 Local Enumeration with WinPEAS Lecture 19 Credential Dumping with netsh (Wi-Fi) Lecture 20 Recon-ng for Windows Infrastructure Lecture 21 Enumerate DNS Records Using DNSRecon Section 5: Exploitation Lecture 22 Use Msfvenom to Create a Reverse TCP Payload Lecture 23 Use Msfvenom to Create an HTTPS Payload Lecture 24 Use Msfvenom to Create Hidden Bind TCP Payload Lecture 25 Use Msfvenom to Create a BIND Shell Payload Lecture 26 HTML Smuggling Attack Lecture 27 Exploiting SQL Injection on Windows Sqlmap Lecture 28 Exploiting the UNIX_Linux rlogin Vulnerability Lecture 29 Exploiting VSFTPD v2.3.4 Using Metasploit Lecture 30 Pentesting with Netcat Section 6: Post-Exploitation & Persistence Lecture 31 Persistent Backdoor Using Service Persistence Lecture 32 Remote Access via PowerShell Reverse Shell Lecture 33 Launch an Automated Meterpreter Session Lecture 34 Disable UAC on Windows using PowerShell Section 7: Privilege Escalation on Windows Lecture 35 Disable UAC on Windows 10 Using Powershell Lecture 36 Verify Windows Privilege Escalation Unquoted Service Path Lecture 37 Windows Privilege Escalation - Unquoted Service Path Section 8: Credential Attacks Lecture 38 Password Cracking with Hydra Lecture 39 Password Cracking with Medusa Lecture 40 Password Cracking with Mimikatz Lecture 41 Password Cracking with Hydra Lecture 42 Brute-Forcing Windows Services (RDP/SMB) Lecture 43 Brute Force the SMB Password Lecture 44 Advanced Password Hacking Techniques with Metasploit Section 9: Wireless & Network Attacks Lecture 45 Quickly Transfer files Using Python's SimpleHTTPServer Lecture 46 Web Application Firewall Detection Using WAFW00F Lecture 47 Spoof Fake TCP IP Packets Using Hping3 Lecture 48 Perform a Vulnerability Scan Using OWASP ZAP Attack Proxy Lecture 49 Exploiting HTTP PUT Ethical Hackers & Pentesters,Cybersecurity Students,Red Teamers & Security Professionals,IT Administrators & System Engineers,Bug Bounty Hunters,Blue Team Defenders ![]() RapidGator NitroFlare DDownload |