Windows Exploits and Forensics: FTP RDP & Other Services

placeholder

To protect an operating system you must first know how to exploit it. This course covers some of the standard Windows services that have known exploits available for them which can be used in offensive security operations against a Windows environment. Youll start by enumerating data from a Windows-based FTP server before practicing methods used to attack FTP services. Youll then learn how to attack IIS-based systems. Next youll examine the RPD protocol and learn methods of attacking the Windows RDP service. Finally youll investigate how WMI works and learn to exploit WMI on a Windows-based machine. This course involves conducting brute force attacks reverse shells and using the BlueKeep security vulnerability.