Select Page

practical Windows

exploitation

Enterprises are suffering from massive cyber security attacks because of vulnerable systems and misconfigured Services . Almost every business in the world is using Windows operating system in the internal environments; due to automation in various tasks as windows make our life easier.

Many businesses have built their IT infrastructure around Microsoft solutions, and have deployed all forms of Windows over time. Furthermore, many have developed their own apps with Microsoft technology .

So it’s easy to understand that  Windows OS’s are of the utmost importance to these businesses.Over the years businesses have locked themselves in with Microsoft that they have become completely dependent of it. Even if they don’t have full use for all the features a given Windows version offers, they have no other choice than buying and deploying, unless the apps have become legacy in which case they are stuck on running EOL’ed versions. On the other side their are multiple issues may arise if these systems are not following security guidelines and due to dependency on the windows many business suffer with malware and services based attacks.

Practical windows exploitation is a complete course for windows privilege escalation in corporate environments. The candidate will start learning from basics such as how services and permission working, advanced commands of windows for enumerating the target . Instructors will Showcase practical demonstrations of actual exploitation of various services & privilege escalation methodologies of windows services and systems like vulnerable windows services , stored credentials , memory exploitation and credential recover and many more .

Practical windows exploitation is an instructor-led online & classroom training that helps students to directly engage with the trainer and learn to configure and exploit the vulnerable Windows System machines to practice & enhance the technical skills to the next level.
In short Practical windows exploitation is a course that will cover up beginner to advanced exploitation and post-exploitation methodologies that helps anyone to audit and pentest the corporate environments during an assessment.

REAL LIFE CASE STUDIES

INSTRUCTOR-LED SESSIONS

INDUSTRY DRIVEN CERTIFICATION

DAILY ASSIGNMENTS

STUDENT LEARNING KIT

 

syllabus

syllabus

module 1 : Windows fundamentals

This module is based on Windows architecture,Windows Security Identifiers , Advanced system commands and usage.

module 2 : Windows insecurities

PowerShell System commands and usages, Windows Firewall & Registry Insecurities and Modification, Hot Fixes, RDP, SMB, WebDAV, SAM essentials, Physical access manipulation, Hotfixes, kernel issues and Beyond Windows DLL concepts will be discussed in depth.

module 3 : Practical Windows Enumeration

Hunting Windows platform for vulnerabilities, File transfer from Target to the victim , Enumeration of various services and protocols with automated and manual methods will be covered in depth.

 

module 4 : offensive Windows exploitation

This module is based on detailed ways to hunt the windows environment as various services, Web-based platforms and how to gain a successful low privilege shell with various methods.

 

module 5 : Windows post-exploitation
  • Kernel exploitation
  • Vulnerable permissions
  • DLL Hijacking
  • Registry permissions
  • Vulnerable Services takeover
  • Elevated Privilege
  • Memory Exploitation
  • Beyond possibilities

 

module 6 : Defense In-Depth

investigate the compromised system and Remediation of vulnerabilities will be discussed with hands-on practices.

 

module 7 : Report writing

This final module covers up detailed enterprise Report writing guidelines.

who should attend this training?
  • Freshers & Students

  • Ethical hackers

  • System Administrators

  • Network Administrators

  • Network Auditors

  • Security Professionals

why should i take this training?

Windows Exploitation is a very interesting topic for the pentesters as many of pentesters are not focusing on this platform but this is the most cortical part as organizations are using mostly windows envriumentes. Enhance your Enterprise Pentesting sills with this amazing training.

prerequisite of the training ?

The person should familiar with basic computer operations 

What is the duration of the training ?

Its an Instructor-led online training and the total duration of the training is 15 hours.

For more details about practical Windows exploitation fill this form

11 + 4 =

Whats Next ? 

Checkout the advanced training modules with the given below link.

Our clients

Testimonials

Today I’ve completed my one 2 one online training by Mr Naresh sir from Certcube Labs .
This is the first time I have attended a class in this format and wondered how effective it would be. It was very effective and therefore I would definitely be interested in attending other classes in the same format. The instructor was very knowlegeable and provided a wealth of information about the current version, especially since the last version I used was several releases ago.
Satyam Singh

BCA, Delhi University

A good place to learn every small detail in cybersecurity.Really nice and helpful teacher.

subhum

Btech, BITS Mesra

together Let’s Create the future

4 + 4 =