YoVDO

Windows Red Team Privilege Escalation Techniques - Bypassing UAC and Kernel Exploits

Offered By: HackerSploit via YouTube

Tags

Privilege Escalation Courses Cybersecurity Courses Network Security Courses Penetration Testing Courses Windows Security Courses

Course Description

Overview

Explore the process of privilege escalation on Windows through various techniques in this 45-minute video from HackerSploit. Learn how adversaries gain higher-level permissions on systems and networks, taking advantage of weaknesses, misconfigurations, and vulnerabilities. Dive into methods for bypassing User Account Control (UAC) and exploiting kernel vulnerabilities. Gain insights into how attackers elevate their access to achieve their objectives, even when initially entering a network with unprivileged access. Access additional resources, including a detailed writeup on Windows privilege escalation fundamentals, to enhance your understanding of these critical cybersecurity concepts.

Syllabus

Windows Red Team Privilege Escalation Techniques - Bypassing UAC & Kernel Exploits


Taught by

HackerSploit

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network