Windows Exploits and Forensics: Post Exploitation


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
As a penetration tester, it's vital that you are familiar with advanced methods of conducting offensive security operations against Windows environments. In this course, you’ll learn to recognize common post exploitation activities within a Windows environment and how to configure an advanced persistent threat. You’ll start by learning how to escalate privileges, use a DLL injection attack, pivot between systems, and crack user credentials. You'll then examine how to use PowerView to enumerate information and use BloodHound to 'walk the dog' and gain domain admin privileges. Finally, you'll learn how to clean up post attack to cover your tracks, create an advanced persistent threat, and use a ransomware attack to lock a system.

Expected Duration (hours)
1.4

Lesson Objectives

Windows Exploits and Forensics: Post Exploitation

  • discover the key concepts covered in this course
  • recognize various user levels and methods of privilege escalation within Windows
  • conduct a basic privilege escalation on a Windows machine
  • use a DLL injection to escalate user privileges on a Windows machine
  • describe the concept of pivoting within a Windows environment and typical end goals
  • use CrackMapExec to steal user credentials from a Windows machine
  • use PowerView to enumerate information from an exploited Windows machine in order to pivot the attack
  • use BloodHound to 'walk the dog', identifying Active Directory security issues and gaining domain admin privileges
  • recognize cleanup methods used post exploitation to hide your tracks
  • perform post attack cleanup tasks
  • recognize what an advanced persistent threat (APT) is and methods used to configure them
  • configure an APT on a system after exploitation
  • use a ransomware attack as a quick method to clean up post attack
  • summarize the key concepts covered in this course
  • Course Number:
    it_cywexfdj_06_enus

    Expertise Level
    Expert