+36 21 2524669
admin@codingprinces.com
Student Portal
My Account
Home
Downloadable Courses
Online Courses
About us
Contact Us
Menu
Home
Downloadable Courses
Online Courses
About us
Contact Us
Windows Privilege Escalation for Beginners, by Heath Adams
About Course
Finding and exploiting Windows vulnerabilities and misconfigurations to gain an administrator shell.
Categories
Development
Course Curriculum
1. Introduction
1. Course Introduction
00:00
2. Resources and Tips for Success
00:00
2. Gaining a Foothold
1. Introduction
00:00
2. Gaining a Foothold (Box 1)
00:00
3. Initial Enumeration
1. System Enumeration
00:00
2. User Enumeration
00:00
3. Network Enumeration
00:00
4. Password Hunting
00:00
5. AV and Firewall Enumeration
00:00
4. Exploring Automated Tools
1. Introduction
00:00
2. Exploring Automated Tools
00:00
5. Escalation Path Kernel Exploits
1. Kernel Exploits Overview
00:00
2. Escalation with Metasploit
00:00
3. Manual Escalation
00:00
6. Escalation Path Passwords and Port Forwarding
1. Overview
00:00
2. Gaining a Foothold (Box 2)
00:00
3. Escalation via Stored Passwords
00:00
7. Escalation Path Windows Subsystem for Linux
1. Overview
00:00
2. Gaining a Foothold (Box 3)
00:00
3. Escalation via WSL
00:00
8. Impersonation and Potato Attacks
1. Token Impersonation Overview
00:00
2. Impersonation Privileges Overview
00:00
3. Potato Attacks Overview
00:00
4. Gaining a Foothold (Box 4)
00:00
5. Escalaction via a Potato Attack.
00:00
6. Alternate Data Streams
00:00
9. Escalation Path getsystem
1. getsystem Overview
00:00
10. Escalation Path RunAs
1. Overview of RunAs
00:00
2. Gaining a Foothold (Box 5)
00:00
11. Additional Labs
1. Overview of TryHackMe Labs
00:00
12. Escalation Path Registry
1. Overview of Autoruns
00:00
2. Escalation via Autorun
00:00
3. AlwaysInstallElevated Overview and Escalation
00:00
4. Overview of regsvc ACL
00:00
5. regsvc Escalation
00:00
13. Escalation Path Executable Files
1. Executable Files Overview
00:00
2. Escalation via Executable Files
00:00
14. Escalation Path Startup Applications
1. Startup Applications Overview
00:00
2. Escalation via Startup Applications
00:00
15. Escalation Path DLL Hijacking
1. Overview and Escalation via DLL Hijacking
00:00
16. Escalation Path Service Permissions (Paths)
1. Escalation via Binary Paths
00:00
2. Escalation via Unquoted Service Paths
00:00
3. Challenge Overview
00:00
4. Gaining a Foothold (Box 7)
00:00
5. Escalation via Unquoted Service Paths (Metasploit)
00:00
6. Manual Challenge Walkthrough
00:00
17. Escalation Path CVE-2019-1388
1. Overview of CVE-2019-1388
00:00
2. Gaining a Foothold (Box 8)
00:00
3. Escalation via CVE-2019-1388
00:00
18. Capstone Challenge
1. Overview
00:00
2. Challenge Walkthrough #1
00:00
3. Challenge Walkthrough #2.
00:00
4. Challenge Walkthrough #3
00:00
19. BONUS Section
1. BONUS LECTURE Course Discord Channel and Other Author Resources
00:00
€
39.79
€
39.79
Add to cart
Hi, Welcome back!
Keep me signed in
Forgot?
Sign In
Don't have an account?
Register Now
Course Details
Level:
All Levels
Duration:
0
Enrolled:
0
Last Updated:
February 5, 2022
Insert/edit link
Close
Enter the destination URL
URL
Link Text
Open link in a new tab
Or link to existing content
Search
No search term specified. Showing recent items.
Search or use up and down arrow keys to select an item.
Cancel