Windows Red Team Privilege Escalation Techniques - Bypassing UAC and Kernel Exploits
Offered By: HackerSploit via YouTube
Course Description
Overview
Explore the process of privilege escalation on Windows through various techniques in this 45-minute video from HackerSploit. Learn how adversaries gain higher-level permissions on systems and networks, taking advantage of weaknesses, misconfigurations, and vulnerabilities. Dive into methods for bypassing User Account Control (UAC) and exploiting kernel vulnerabilities. Gain insights into how attackers elevate their access to achieve their objectives, even when initially entering a network with unprivileged access. Access additional resources, including a detailed writeup on Windows privilege escalation fundamentals, to enhance your understanding of these critical cybersecurity concepts.
Syllabus
Windows Red Team Privilege Escalation Techniques - Bypassing UAC & Kernel Exploits
Taught by
HackerSploit
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity