Privilege Escalation with UACMe
Offered By: Pluralsight
Course Description
Overview
In this course, you will learn how to bypass Windows user account control and elevate your privileges.
UACME is an open-source tool used to bypass Windows user account control and get local administrator privileges, it is used by Threat actors, Red teams, Blue teams and Pen testers. In this course, Privilege Escalation with UACMe, you’ll learn how to utilize UACMe to bypass Windows user account control and get local admin privileges in a red team environment. First, we’ll demonstrate how to compile and use this tool. Next, we’ll simulate a real world scenario using UACMe to gain local admin privileges. Finally, you'll learn the importance to know how these techniques can be used against you that will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors. When you’re finished with this course, you’ll have the skills and knowledge to execute the technique, bypass user account control #T1548 using UACMe.
UACME is an open-source tool used to bypass Windows user account control and get local administrator privileges, it is used by Threat actors, Red teams, Blue teams and Pen testers. In this course, Privilege Escalation with UACMe, you’ll learn how to utilize UACMe to bypass Windows user account control and get local admin privileges in a red team environment. First, we’ll demonstrate how to compile and use this tool. Next, we’ll simulate a real world scenario using UACMe to gain local admin privileges. Finally, you'll learn the importance to know how these techniques can be used against you that will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors. When you’re finished with this course, you’ll have the skills and knowledge to execute the technique, bypass user account control #T1548 using UACMe.
Syllabus
- Course Overview 1min
- Using UACMe to Escalate Privileges 7mins
- Resources 1min
Taught by
Malek Mohammad
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent