Enterprises are suffering from massive cyber security attacks becuase of vulnerble systems and envriurmentes . Almost every business in the world is using windows operation system in the enviouments , due to automation in various tasks windows makes our life easier but on the other side thair are muliple issues may arise if these systems are following security guidelines .
Practical windows exploitation is a complete course for windows privilege escalation in corporate environments. The candidate will start learning from basics such as services and permission working, basic commands in windows for enumerating the target and demonstrations of actual exploitation & privilege escalation methodologies. This is an instructor-led online & classroom training that helps students to directly engage with the trainer and learn to configure and exploit the vulnerable Windows System machines to practice & enhance the technical skills to the next level.
This is course will cover up beginner to advanced exploitation and post-exploitation methodologies that helps anyone to audit and pentest the corporate environments during an assessment.
REAL LIFE CASE STUDIES
INDUSTRY DRIVEN CERTIFICATION
STUDENT LEARNING KIT
This module is based on Windows architecture,Windows Security Identifiers , Advanced system commands and usage.
Windows System Commands and usages, Windows Firewall & Registry Insecurities and Modification, Hot Fixes, RDP, SMB, WebDAV, SAM essentials, Physical access manipulation, Hotfixes, kernel issues and Beyond Windows DLL concepts will be discussed in depth.
Hunting Windows platform for vulnerabilities , Enumeration of target with automated and manual methods will be covered in depth
Detailed ways to Hunt the windows environment, Web-based platforms and get a successful shell will be covered with POCs.
- Kernel exploitation
- Vulnerable permissions
- DLL Hijacking
- Registry permissions
- Vulnerable Services takeover
- Elevated Privilege
- Memory Exploitation
- Beyond possibilities
investigate the compromised system and Remediation of vulnerabilities will be discussed in Depth
who should attend this training?
Freshers & Students
why should i take this training?
Windows Exploitation is a very interesting topic for the pentesters as many of pentesters are not focusing on this platform but this is the most cortical part as organizations are using mostly windows envriumentes. Enhance your Enterprise Pentesting sills with this amazing training.
pri-requisite of the training ?
The person should familiar with basic computer operations
What is the duration of the training ?
Its an Instructor-led online training and the total duration of the training is 15 hours.