Getting Started with PowerSploit
Offered By: Pluralsight
Course Description
Overview
For years, the tools contained within PowerSploit have provided attackers and defenders with the capability to easily exploit misconfigured AD environments. Learn how to use PowerSploit to compromise systems, gather data, and escalate privileges.
PowerSploit provides tools that assist defenders and attackers in identifying and exploiting vulnerabilities in Windows based networks and systems. In this course, Getting Started with PowerSploit 1, you will learn foundational knowledge to use the tools provided within the PowerSploit Post Exploitation Framework. First, you will learn how to leverage the tools within the code execution module. Next, you will discover how you can use PowerSploit to identify escalation opportunities. Finally, you will explore how to perform enumeration activities. When you're finished with this course, you will have the skills and knowledge of PowerSploit needed to incorporate PowerSploit into your testing activities.
PowerSploit provides tools that assist defenders and attackers in identifying and exploiting vulnerabilities in Windows based networks and systems. In this course, Getting Started with PowerSploit 1, you will learn foundational knowledge to use the tools provided within the PowerSploit Post Exploitation Framework. First, you will learn how to leverage the tools within the code execution module. Next, you will discover how you can use PowerSploit to identify escalation opportunities. Finally, you will explore how to perform enumeration activities. When you're finished with this course, you will have the skills and knowledge of PowerSploit needed to incorporate PowerSploit into your testing activities.
Syllabus
- Course Overview 1min
- Analyzing PowerSploit Attack Capabilities 15mins
- Using PowerSploit to Perform Code Execution Attack 24mins
- Leveraging PowerSploit to Gain Elevated Privileges on Workstations and Servers 16mins
- Performing System and Domain Reconnaissance 27mins
- Using PowerSploit to Compress, Compile, Encrypt, and Modify Files 18mins
- Using PowerSploit to Maintain Access on Compromised Systems 12mins
- Gathering Interesting and Useful Data from Compromised Systems 18mins
- Having Fun with PowerSploit 7mins
Taught by
Lee Allen
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent