Windows Exploits and Forensics: Post Exploitation
As a penetration tester vital that you are familiar with advanced methods of conducting offensive security operations against Windows environments. In this course you’ll learn to recognize common post exploitation activities within a Windows environment and how to configure an advanced persistent threat. You’ll start by learning how to escalate privileges use a DLL injection attack pivot between systems and crack user credentials. Youll then examine how to use PowerView to enumerate information and use BloodHound to walk the dog and gain domain admin privileges. Finally youll learn how to clean up post attack to cover your tracks create an advanced persistent threat and use a ransomware attack to lock a system.