Jump to content
smartlen

Practical Windows Penetration Testing

Recommended Posts

Table of Contents

Environment Setup

Recon

Exploitation Techniques

Post-Exploitation

Propagation Attacks

Video Description

Managing Windows security has always been a challenge for any security professional. As Windows is the most popular operating system in the corporate environment, this course will help you detect and tackle attacks early to save your organization data and money.

This course will follow a typical penetration test scenario throughout. At each stage, you will be shown all the necessary tools and techniques, and how they are applied. The whole course is hands-on to guarantee that you gain practical knowledge. You will start by setting up the environment and learn service identification and network scanning techniques. You will master various exploitation and post exploitation techniques. You will also learn to proxy traffic and implement the most famous hacking technique: the pass-the-hash attack.

By the end of this video tutorial, you will be able to successfully identify and tackle the flaws and vulnerabilities within the Windows OS (versions 7, 8.1, 10) using Metasploit and Kali Linux tools.

Style and Approach

Each section of the course is a phase in the timeline of a penetration test, so that you can follow a typical testing process. This will be a step by step tutorial to help you tackle attacks and make your system secure through well-demonstrated exercises.

What You Will Learn

Scan and discover Windows environments to identify an attack surface.

Gather information that could be helpful in exploitation.

Penetrate Windows machines through various services.

Exploit well-known Windows vulnerabilities.

Create persistent access to an exploited machine and maintain a stable backdoor.

Collect valuable information from the exploited host.

Propagate to other machines using Pass-The-Hash techniques.

 

Hidden Content

    Give reaction to this post to see the hidden content.

  • Like 3
  • Thanks 1

Share this post


Link to post
Share on other sites

Table of Contents

Environment Setup

Recon

Exploitation Techniques

Post-Exploitation

Propagation Attacks

Video Description

Managing Windows security has always been a challenge for any security professional. As Windows is the most popular operating system in the corporate environment, this course will help you detect and tackle attacks early to save your organization data and money.

This course will follow a typical penetration test scenario throughout. At each stage, you will be shown all the necessary tools and techniques, and how they are applied. The whole course is hands-on to guarantee that you gain practical knowledge. You will start by setting up the environment and learn service identification and network scanning techniques. You will master various exploitation and post exploitation techniques. You will also learn to proxy traffic and implement the most famous hacking technique: the pass-the-hash attack.

By the end of this video tutorial, you will be able to successfully identify and tackle the flaws and vulnerabilities within the Windows OS (versions 7, 8.1, 10) using Metasploit and Kali Linux tools.

Style and Approach

Each section of the course is a phase in the timeline of a penetration test, so that you can follow a typical testing process. This will be a step by step tutorial to help you tackle attacks and make your system secure through well-demonstrated exercises.

What You Will Learn

Scan and discover Windows environments to identify an attack surface.

Gather information that could be helpful in exploitation.

Penetrate Windows machines through various services.

Exploit well-known Windows vulnerabilities.

Create persistent access to an exploited machine and maintain a stable backdoor.

Collect valuable information from the exploited host.

Propagate to other machines using Pass-The-Hash techniques.

 

Hey Smartlen this is asking for VIP technet24.ir/ which cost 19000 USD

Hidden Content

    Give reaction to this post to see the hidden content.
/uploads/emoticons/default_sad.png">

 

Can you please upload it in mega or some other place and share it.

 

it would be really helpful if you can reshare on mega or torrent

  • Like 3

Share this post


Link to post
Share on other sites

here is the free torrent :

Hidden Content

    Give reaction to this post to see the hidden content.

  • Like 3

Share this post


Link to post
Share on other sites

Hey Smartlen this is asking for VIP technet24.ir/ which cost 19000 USD

Hidden Content

    Give reaction to this post to see the hidden content.
/uploads/emoticons/default_sad.png">

 

Can you please upload it in mega or some other place and share it.

 

it would be really helpful if you can reshare on mega or torrent

19000 USD is price of a house in IRAN. definitely the VIP price is wrong.

  • Like 3

Share this post


Link to post
Share on other sites

Moderators need to crack down on this crap of linking to pay only sites.

This is different.

When the original author shared this technet24 link, technet24 was still free.

Unfortunately, Technet24 decided to add a paywall very recently..

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...