Windows Red Team Exploitation Techniques | Red Team Series 3-13
Offered By: Linode via Independent
Course Description
Overview
This guide is part of the HackerSploit Red Team series of guides. In this video, we will cover Exploitation Techniques for Windows systems. Techniques used to gain a foothold include targeted spear phishing and exploiting weaknesses on public-facing web servers. Footholds gained through initial access may allow for continued access, like valid accounts and use of external remote services, or may be limited use due to changing passwords.
Syllabus
Introduction
What We’ll Be Covering
Mitre Attack Initial Access
A Note About Phishing
Our Methodologies
Let’s get Started
Setting Up Our Infrastructure Empire & Starkiller
Start the Powershell Empire Server
Start the Powershell Empire Client
Initializing Starkiller
Examining the Starkiller UI
Enable the csharpserver Plugin
Installing Luckystrike
Installing Module Invoke-Obfuscation
Loading the Module into PowerShell
How to use Luckystrike
Generating our Payloads
Download our Payloads
Working with Luckystrike
Executing our Payloads
Remotely Executing Exploits via Modules
Brief Chat about Phishing
Brief Chat about Additional Stagers
Why We Didn’t Talk About Encoding or Obfuscation
Conclusion
Taught by
Linode
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX