Udemy - Advanced Windows Privilege Escalation with Hack The Box
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size6.2 GB
- Uploaded Bytutsnode
- Downloads147
- Last checkedJan. 18th '21
- Date uploadedJan. 16th '21
- Seeders 29
- Leechers15
Description
New Launch for Spring 2021!
This is a 100% hands on course as you will be using the same tradecraft and techniques Red Teamer’s and advanced adversaries use to escalate privileges on Windows endpoints after they have gained initial access and established a foothold. This course is not “death by PowerPoint”, in fact there is not a single Powerpoint slide in the course. This course is aimed for intermediate to advanced users who are hungry to know how to discover and exploit novel escalation paths on patched fully patched Windows 10 endpoints. Everything is carefully, explained – step-by-step.
Additionally, although Metasploit is used in some attacks, we will be using less Metasploit and more manual walk-throughs because I wanted to take the time to carefully explain WHY each method works and detail how common misconfigurations happen in enterprise environments.
Where Metasploit is used, everything is carefully explained and deconstructed so you can understand why and how it works. Exploits start easy and escalate in difficulty as you progress through the course.
The Techniques
You will quickly learn and execute the following escalation of privilege techniques across 5 vulnerable machines
Windows Kernel Exploits
Weak Registry Permissions
Token Manipulation
CVE Exploits
DPAPI Abuse (Three New Lectures Just Added January 2021!)
The Tools
You will use msfvenom, BC Security PowerShell Empire, CrackMapExec, netcat, smbserver, wfuzz, gobuster, dirsearch, sqlmap, Mimikatz, Burp Suite (advanced features), Python 3, Powershell 7 on Linux and more. You will learn IIS 10 Server Administration, how to threat hunt for SQLi attacks in web logs and much much more.
My dream for you
By the end of this course you should be able to use these techniques in:
Your day to day work
OSCP preparation
CTF hacking
About the lab
There are 10 vulnerable machines.
No lab setup is required as the entire environment is already established in HackTheBox VIP labs
I wanted to make this course as realistic as possible while removing as many barriers to entry as possible so I’ve partnered with HackTheBox VIP labs to make it as easy as possible to get started.
Yes, HackTheBox is an additional charge but it offers hundreds of pre-configured vulnerable machines in a lab which is accessible via a VPN connection. This means you can get started right away and don’t have to waste time fumbling with VirtualBox and VMWare settings on your local system. Most of the systems are also licensed which provides the best environment for realistic exploitation.
Tip:
I made these videos so all commands are zoomed in close so you can watch on a mobile phone if desired. I hate watching videos on my smartphone and squinting at the command prompt or terminal. Never again will that happen.
Who this course is for:
Students interested in how attackers escalate privileges on modern Windows endpoints
Beginning and Intermediate cyber security students.
Students looking for OCSP practice
Requirements
A HackTheBox VIP Subscription is Required
Basic knowledge of virtual machines
Last Updated 1/2021
Files:
Advanced Windows Privilege Escalation with Hack The Box [TutsNode.com] - Advanced Windows Privilege Escalation with Hack The Box 02 Techniques- 014 Token Manipulation (Compromise).mp4 (794.7 MB)
- 009 Weak Registry Permissions (Compromise).en.srt (98.2 KB)
- 014 Token Manipulation (Compromise).en.srt (91.3 KB)
- 018 CVE (Compromise).en.srt (85.5 KB)
- 017 BONUS! Token Manipulation (MITRE ATT&CK Mapping).en.srt (5.1 KB)
- 009 Weak Registry Permissions (Compromise).mp4 (760.9 MB)
- 007 Kernel Exploits (Thought Process).en.srt (59.9 KB)
- 007 Kernel Exploits (Thought Process).mp4 (666.3 MB)
- 011 Weak Registry Permissions (Vertical Escalation).en.srt (48.7 KB)
- 006 Kernel Exploits (Compromise).en.srt (51.0 KB)
- 019 CVE (Vertical Escalation).en.srt (45.2 KB)
- 022 DPAPI (Compromise).en.srt (42.5 KB)
- 023 DPAPI (Vertical Escalation) DPAPI Abuse with Mimikatz.en.srt (24.6 KB)
- 020 CVE (Vertical Escalation) Dangerous Alternate Method.en.srt (23.0 KB)
- 008 Kernel Exploits (Final Escalation).en.srt (17.1 KB)
- 010 Weak Registry Permissions (Horizontal Escalation).en.srt (16.7 KB)
- 016 Token Manipulation (Threat Hunting the Attack).en.srt (16.3 KB)
- 012 Weak Registry Permissions (Threat Hunting the Attack).en.srt (14.1 KB)
- 024 DPAPI (Vertical Escalation) runas Cached Credentials Abuse.en.srt (9.3 KB)
- 021 CVE (Threat Hunting the Attack) ... kinda!.en.srt (8.9 KB)
- 015 Token Manipulation (Vertical Escalation).en.srt (7.7 KB)
- 013 BONUS! Weak Registry Permissions (MITRE ATT&CK Mapping).en.srt (5.3 KB)
- 018 CVE (Compromise).mp4 (647.6 MB)
- 011 Weak Registry Permissions (Vertical Escalation).mp4 (482.0 MB)
- 022 DPAPI (Compromise).mp4 (381.9 MB)
- 006 Kernel Exploits (Compromise).mp4 (339.5 MB)
- 019 CVE (Vertical Escalation).mp4 (307.3 MB)
- 008 Kernel Exploits (Final Escalation).mp4 (244.2 MB)
- 020 CVE (Vertical Escalation) Dangerous Alternate Method.mp4 (237.4 MB)
- 023 DPAPI (Vertical Escalation) DPAPI Abuse with Mimikatz.mp4 (227.7 MB)
- 012 Weak Registry Permissions (Threat Hunting the Attack).mp4 (174.0 MB)
- 016 Token Manipulation (Threat Hunting the Attack).mp4 (167.7 MB)
- 010 Weak Registry Permissions (Horizontal Escalation).mp4 (145.1 MB)
- 021 CVE (Threat Hunting the Attack) ... kinda!.mp4 (122.8 MB)
- 015 Token Manipulation (Vertical Escalation).mp4 (99.0 MB)
- 024 DPAPI (Vertical Escalation) runas Cached Credentials Abuse.mp4 (79.4 MB)
- 017 BONUS! Token Manipulation (MITRE ATT&CK Mapping).mp4 (54.2 MB)
- 013 BONUS! Weak Registry Permissions (MITRE ATT&CK Mapping).mp4 (50.1 MB)
- 001 Accessing the HackTheBox Labs.en.srt (15.4 KB)
- 003 Hands On with pwnbox_ Your Attacker VM.en.srt (12.5 KB)
- 005 Hands On with Kali_ How To Connect via OpenVPN.en.srt (9.9 KB)
- 002 Exploring your HackTheBox VIP account.en.srt (4.1 KB)
- 004 Hands On with pwnbox_ How to Connect via SSH.en.srt (3.7 KB)
- 001 Accessing the HackTheBox Labs.mp4 (128.8 MB)
- 003 Hands On with pwnbox_ Your Attacker VM.mp4 (87.2 MB)
- 005 Hands On with Kali_ How To Connect via OpenVPN.mp4 (56.9 MB)
- 004 Hands On with pwnbox_ How to Connect via SSH.mp4 (25.5 MB)
- 002 Exploring your HackTheBox VIP account.mp4 (24.2 MB)
- TutsNode.com.txt (0.1 KB) .pad
- 0 (0.2 KB)
- 1 (0.8 KB)
- 2 (352.4 KB)
- 3 (458.3 KB)
- 4 (45.9 KB)
- 5 (54.6 KB)
- 6 (471.5 KB)
- 7 (691.7 KB)
- 8 (848.4 KB)
- 9 (636.7 KB)
- 10 (282.2 KB)
- 11 (9.9 KB)
- 12 (291.3 KB)
- 13 (944.3 KB)
- 14 (202.0 KB)
- 15 (248.7 KB)
- 16 (984.1 KB)
- 17 (793.2 KB)
- 18 (635.9 KB)
- 19 (78.6 KB)
- 20 (774.7 KB)
- 21 (888.2 KB)
- 22 (531.2 KB)
- [TGx]Downloaded from torrentgalaxy.to .txt (0.6 KB)
Code:
- udp://inferno.demonoid.pw:3391/announce
- udp://tracker.openbittorrent.com:80/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://torrent.gresille.org:80/announce
- udp://glotorrents.pw:6969/announce
- udp://tracker.leechers-paradise.org:6969/announce
- udp://tracker.pirateparty.gr:6969/announce
- udp://tracker.coppersurfer.tk:6969/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://9.rarbg.to:2710/announce
- udp://shadowshq.yi.org:6969/announce
- udp://tracker.zer0day.to:1337/announce