YoVDO

Windows Red Team Exploitation Techniques | Red Team Series 3-13

Offered By: Linode via Independent

Tags

Red Team Courses Cybersecurity Courses Ethical Hacking Courses Spear Phishing Courses

Course Description

Overview

This guide is part of the HackerSploit Red Team series of guides. In this video, we will cover Exploitation Techniques for Windows systems. Techniques used to gain a foothold include targeted spear phishing and exploiting weaknesses on public-facing web servers. Footholds gained through initial access may allow for continued access, like valid accounts and use of external remote services, or may be limited use due to changing passwords.


Syllabus

Introduction
What We’ll Be Covering
Mitre Attack Initial Access
A Note About Phishing
Our Methodologies
Let’s get Started
Setting Up Our Infrastructure Empire & Starkiller
Start the Powershell Empire Server
Start the Powershell Empire Client
Initializing Starkiller
Examining the Starkiller UI
Enable the csharpserver Plugin
Installing Luckystrike
Installing Module Invoke-Obfuscation
Loading the Module into PowerShell
How to use Luckystrike
Generating our Payloads
Download our Payloads
Working with Luckystrike
Executing our Payloads
Remotely Executing Exploits via Modules
Brief Chat about Phishing
Brief Chat about Additional Stagers
Why We Didn’t Talk About Encoding or Obfuscation
Conclusion


Taught by

Linode

Related Courses

People Information Gathering with the Social Engineering Toolkit (SET)
Pluralsight
Application of the MITRE ATT&CK Framework
Cybrary
Linux Red Team Exploitation Techniques - Red Team Series
Linode via YouTube
Early Detection through Deception
YouTube
Psychological Warfare - How Cyber Criminals Mess With Your Mind
YouTube