Windows Local Privilege Escalation Mastery. Red Team - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Windows Local Privilege Escalation Mastery. Red Team (/Thread-Windows-Local-Privilege-Escalation-Mastery-Red-Team) |
Windows Local Privilege Escalation Mastery. Red Team - Farid - 09-30-2023 Windows Local Privilege Escalation Mastery - Red Team Published 8/2023 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz Language: English | Size: 3.38 GB | Duration: 6h 41m Local Privilege Escalation Windows For Pentesters and Read Team What you'll learn Windows Local Privilege Escalation Manually Windows Local Privilege Escalation With Metasploit How to Exploit Active Directory From Windows Windows Local Privilege Escalation With Evil-WinRM Windows Local Privilege Escalation With Empire How to Use Metasploit to Exploit Active Directory How to Use Empire to Exploit Active Directory How to Use Evil-WinRM to Exploit Active Directory How to Use CrackMapExec to Exploit Active Directory PowerView PowerShell Module Requirements Windows Server Experience Knowledge of Active Directory Description The Windows Privilege Escalation Mastery course is a comprehensive and hands-on training program designed for cybersecurity professionals, system administrators, penetration testers, and anyone seeking to enhance their skills in identifying and exploiting privilege escalation vulnerabilities within Windows environments. This immersive course will equip participants with in-depth knowledge and practical techniques to escalate privileges on Windows systems securely and efficiently.Key Learning Objectives:Understanding Windows Privilege Models: Gain insights into Windows privilege models, user permissions, and the underlying mechanisms that govern user access rights.Exploiting Vulnerabilities: Learn how to identify and exploit common privilege escalation vulnerabilities in Windows, including misconfigurations, weak file permissions, insecure services, and more.Enumeration Techniques: Master the art of enumerating users, groups, services, and system information to identify potential privilege escalation opportunities.Kernel Exploits: Explore advanced techniques to escalate privileges through kernel-level exploits, understanding Windows kernel architecture, and bypassing security mechanisms.Post-Exploitation Strategies: Learn post-exploitation methodologies to maintain persistent access and cover tracks after privilege escalation.Course Features:Expert Instructors: Learn from seasoned cybersecurity professionals with extensive experience in penetration testing and Windows security.Cutting-Edge Tools: Familiarize yourself with the latest tools and utilities used for Windows privilege escalation.Practical Tips and Best Practices: Get insider tips, tricks, and best practices to conduct privilege escalation assessments effectively and efficiently. Overview Section 1: Privilege Escalation - Manually Lecture 1 Local User & Group Enumeration Lecture 2 Network Enumeration Lecture 3 Antivirus & Detections Lecture 4 Hunting Passwords Lecture 5 Tools Lecture 6 Windows Version and Configuration Lecture 7 Sherlock & Watson Lecture 8 CVE-2019-1388 Lecture 9 Schedule Task Privilege Escalation Lecture 10 Unquoted Service Path Lecture 11 SEImpersonate Lecture 12 ZeroLogon CVE-2020-1472 Lecture 13 Windows - Privilege Escalation and Local Enumeartion Cheat Sheet Lecture 14 Recommended Windows Hack The Box machines Section 2: Local Privilege Escalation With EvilWinRM Lecture 15 Basic commands Lecture 16 Upload and Download Lecture 17 PowerView Lecture 18 Build SharpSploit - Enumeration Lecture 19 User, Group, and Network Lecture 20 Tools - Local Priv Esc Section 3: Windows Local Privilege Escalation With Empire Lecture 21 Basics and Installing Lecture 22 Getting a Shell + CME + Powershell Lecture 23 Getting a shell + Evil-WinRM + Bat File Lecture 24 Privilege Escalation 1 - ReverShell With Unquoted Path Lecture 25 Privilege Escalation 2 - Stager with NT/SYSTEM Lecture 26 Privilege Escalation 3 Lecture 27 Elevated with Empire - Mimikatz and pth Lecture 28 Pth + dcsync + dcshadow -1 Section 4: Windows Local Privilege Escalation With Metasploit Lecture 29 Intro Lecture 30 Exploiting Ethernal Blue Metasploit Lecture 31 Enumeration 1 - User, Groups, Computers Lecture 32 Enumeration 2 - Arp, Tokens, Patches Lecture 33 Enumeration 3 - Shares, SMB, and More Lecture 34 Exploit Suggestor Lecture 35 Exploit Suggestor 2 Lecture 36 Back door add user Lecture 37 HashDump With Metasploit Lecture 38 Lateral Movement - PTH With metasploit Lecture 39 Lateral Movement To DC - Metasploit Lecture 40 Steal_Token and Dumping All Hashes - Metasploit Lecture 41 DcSync With Metasploit Lecture 42 Golden Ticket With Metasploit Lecture 43 BACKDOOR METERPRETER SERVICE 1 Lecture 44 BACKDOOR METERPRETER SERVICE 2 Students who would love to become a Windows Local Privilege Escalation Expert,Students who would love a Job as a Red Team,Students who would love to learn how to Attack the Windows OS Windows Local Privilege Escalation Mastery. Red Team (3.38 GB) KatFile Link(s) RapidGator Link(s) |