Living Off the Land - A Minimalist's Guide to Windows Post-Exploitation
Offered By: YouTube
Course Description
Overview
Explore advanced Windows post-exploitation techniques in this 47-minute conference talk from DerbyCon 3.0. Discover minimalist approaches to maintaining access and gathering information on compromised systems using built-in Windows tools and utilities. Learn how to effectively "live off the land" by leveraging native Windows functionality for stealthy post-exploitation activities, reducing the need for external tools and minimizing detection risk. Gain insights into practical strategies for information gathering, privilege escalation, and lateral movement within Windows environments using only native operating system capabilities.
Syllabus
DerbyCon 3 0 1209 Living Off The Land A Minimalist S Guide To Windows Post Exploitation Christopher
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent