English | MP4 | AVC 1920×1080 | AAC 48KHz 2ch | 5h 14m | 1.12 GB
Attacking & securing Windows systems with Metasploit and Kali Linux
Managing Windows security has always been a challenge for any security professional. As Windows is the most popular operating system in the corporate environment, this course will help you detect and tackle attacks early to save your organization data and money.
This course will follow a typical penetration test scenario throughout. At each stage, you will be shown all the necessary tools and techniques, and how they are applied. The whole course is hands-on to guarantee that you gain practical knowledge. You will start by setting up the environment and learn service identification and network scanning techniques. You will master various exploitation and post exploitation techniques. You will also learn to proxy traffic and implement the most famous hacking technique: the pass-the-hash attack.
By the end of this video tutorial, you will be able to successfully identify and tackle the flaws and vulnerabilities within the Windows OS (versions 7, 8.1, 10) using Metasploit and Kali Linux tools.
Each section of the course is a phase in the timeline of a penetration test, so that you can follow a typical testing process. This will be a step by step tutorial to help you tackle attacks and make your system secure through well-demonstrated exercises.
What You Will Learn
- Scan and discover Windows environments to identify an attack surface.
- Gather information that could be helpful in exploitation.
- Penetrate Windows machines through various services.
- Exploit well-known Windows vulnerabilities.
- Create persistent access to an exploited machine and maintain a stable backdoor.
- Collect valuable information from the exploited host.
- Propagate to other machines using Pass-The-Hash techniques.
Table of Contents
Environment Setup
1 The Course Overview
2 Disclaimer
3 Test Lab Architecture
4 Setting Up Kali
5 Setting Up Target Win 10
6 Setting Up Target Win 2016
7 Creating the Domain
Recon
8 Scanning
9 Service Identification
Exploitation Techniques
10 Using Public Exploits
11 Exploiting with Metasploit
12 Social Engineering
13 Evading Anti-Virus
14 Final Word on Exploitation
Post-Exploitation
15 About Post-Exploitation
16 Meterpreter
17 Privilege Escalation
18 Collecting Credentials
19 Password Brute-Force
20 Achieving Persistence
Propagation Attacks
21 Pivoting
22 Pass-the-Hash Attack
23 Review And Next Steps
Resolve the captcha to access the links!