Windows Red Team Credential Access Techniques - Mimikatz & WCE
Offered By: HackerSploit via YouTube
Course Description
Overview
Explore Windows Red Team credential access techniques and tools for dumping clear-text passwords and NTLM hashes from memory in this 42-minute video. Delve into the concept of Credential Access, which involves stealing account names and passwords through methods like keylogging and credential dumping. Learn about Mimikatz, a powerful post-exploitation tool for extracting passwords, hashes, PINs, and Kerberos tickets from memory. Discover additional attack techniques such as pass-the-hash, pass-the-ticket, and creating Golden Kerberos tickets. Access a detailed writeup and links to related resources, including the MITRE ATT&CK Framework and PowerShell Empire. Gain insights into advanced credential access methods used by adversaries to maintain access and evade detection in Windows environments.
Syllabus
Windows Red Team Credential Access Techniques | Mimikatz & WCE
Taught by
HackerSploit
Related Courses
The RedTeam Blueprint - A Unique Guide To Ethical HackingUdemy Red Team Ethical Hacking - Beginner
Udemy Active Directory Pentesting Full Course - Red Team Hacking
Udemy Active Directory Pentesting With Kali Linux - Red Team
Udemy Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK
Pluralsight