Privilege Escalation with UACMe
Offered By: Pluralsight
Course Description
Overview
In this course, you will learn how to bypass Windows user account control and elevate your privileges.
UACME is an open-source tool used to bypass Windows user account control and get local administrator privileges, it is used by Threat actors, Red teams, Blue teams and Pen testers. In this course, Privilege Escalation with UACMe, you’ll learn how to utilize UACMe to bypass Windows user account control and get local admin privileges in a red team environment. First, we’ll demonstrate how to compile and use this tool. Next, we’ll simulate a real world scenario using UACMe to gain local admin privileges. Finally, you'll learn the importance to know how these techniques can be used against you that will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors. When you’re finished with this course, you’ll have the skills and knowledge to execute the technique, bypass user account control #T1548 using UACMe.
UACME is an open-source tool used to bypass Windows user account control and get local administrator privileges, it is used by Threat actors, Red teams, Blue teams and Pen testers. In this course, Privilege Escalation with UACMe, you’ll learn how to utilize UACMe to bypass Windows user account control and get local admin privileges in a red team environment. First, we’ll demonstrate how to compile and use this tool. Next, we’ll simulate a real world scenario using UACMe to gain local admin privileges. Finally, you'll learn the importance to know how these techniques can be used against you that will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors. When you’re finished with this course, you’ll have the skills and knowledge to execute the technique, bypass user account control #T1548 using UACMe.
Syllabus
- Course Overview 1min
- Using UACMe to Escalate Privileges 7mins
- Resources 1min
Taught by
Malek Mohammad
Related Courses
Assessing Red Team Post Exploitation ActivityPluralsight Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK
Pluralsight Selecting the Right Tool(s) for Your Red Team Operation
Pluralsight Active Directory Pentesting With Kali Linux - Red Team
Udemy Active Directory Pentesting Full Course - Red Team Hacking
Udemy