YoVDO

Windows Red Team Exploitation Techniques | Red Team Series 3-13

Offered By: Linode via Independent

Tags

Red Team Courses Cybersecurity Courses Ethical Hacking Courses Spear Phishing Courses

Course Description

Overview

This guide is part of the HackerSploit Red Team series of guides. In this video, we will cover Exploitation Techniques for Windows systems. Techniques used to gain a foothold include targeted spear phishing and exploiting weaknesses on public-facing web servers. Footholds gained through initial access may allow for continued access, like valid accounts and use of external remote services, or may be limited use due to changing passwords.


Syllabus

Introduction
What We’ll Be Covering
Mitre Attack Initial Access
A Note About Phishing
Our Methodologies
Let’s get Started
Setting Up Our Infrastructure Empire & Starkiller
Start the Powershell Empire Server
Start the Powershell Empire Client
Initializing Starkiller
Examining the Starkiller UI
Enable the csharpserver Plugin
Installing Luckystrike
Installing Module Invoke-Obfuscation
Loading the Module into PowerShell
How to use Luckystrike
Generating our Payloads
Download our Payloads
Working with Luckystrike
Executing our Payloads
Remotely Executing Exploits via Modules
Brief Chat about Phishing
Brief Chat about Additional Stagers
Why We Didn’t Talk About Encoding or Obfuscation
Conclusion


Taught by

Linode

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera