YoVDO

Windows Privilege Escalation Techniques - Red Team Series

Offered By: Linode via YouTube

Tags

Red Team Courses Cybersecurity Courses Ethical Hacking Courses Windows Privilege Escalation Courses Meterpreter Courses

Course Description

Overview

Explore Windows privilege escalation techniques in this comprehensive video from the Red Team Series. Learn how to bypass User Account Control (UAC) using Empire and Meterpreter, utilize kernel exploits, and implement token impersonation. Dive into MITRE ATT&CK privilege escalation tactics and understand the target environment. Gain practical knowledge on installing and executing exploits, with detailed explanations of how they work. Perfect for cybersecurity professionals and ethical hackers looking to enhance their red team skills in Windows environments.

Syllabus

Introduction
What We’ll Be Covering
Windows Privilege Escalation Techniques
MITRE Attack Privilege Escalation Tactics
About Our Target Environment
How to Bypass UAC with Empire
How to Bypass UAC with Meterpreter
How to Use Kernel Exploits
How Does the Exploit Work?
How to Install the Exploit
How to Use Token Impersonation
Conclusion


Taught by

Linode

Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX