YoVDO

Living Off the Land - A Minimalist's Guide to Windows Post-Exploitation

Offered By: YouTube

Tags

DerbyCon Courses Cybersecurity Courses Ethical Hacking Courses Penetration Testing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced Windows post-exploitation techniques in this 47-minute conference talk from DerbyCon 3.0. Discover minimalist approaches to maintaining access and gathering information on compromised systems using built-in Windows tools and utilities. Learn how to effectively "live off the land" by leveraging native Windows functionality for stealthy post-exploitation activities, reducing the need for external tools and minimizing detection risk. Gain insights into practical strategies for information gathering, privilege escalation, and lateral movement within Windows environments using only native operating system capabilities.

Syllabus

DerbyCon 3 0 1209 Living Off The Land A Minimalist S Guide To Windows Post Exploitation Christopher


Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent