Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Exclusive - Penetration Testing Exploitation and Post-Exploitation Bootcamp 2022
Penetration Testing Exploitation and Post-Exploitation Bootcamp 2022
01_Course Introduction (10:02)
02_Introduction To The MITRE ATT&CK Framework (33:55)
03_Initial Access (6:26)
04_Exploiting Public-Facing Applications - T1190 (3:09)
05_RCE Via MySQL (23:53)
06_jQuery File Upload Vulnerability (11:11)
07_Exploiting External Remote Services - T1133 (0:59)
08_Exploiting SMB With PsExec (18:01)
09_Exploiting WinRM (5:00)
10_Initial Access Via Spearphishing - T1566.002 - Part 1 (5:00)
11_Initial Access Via Spearphishing - T1566.002 - Part 2 (5:00)
12_Introduction To Post-Exploitation (5:00)
13_Post-Exploitation Methodology (2:23)
14_Local Enumeration On Windows (5:00)
15_Windows Privilege Escalation (0:39)
16_Windows Unattended Installs (5:00)
17_Bypassing UAC With UACMe (5:00)
18_Windows Access Token Impersonation (5:00)
19_Persistence Via Scheduled Tasks (5:00)
20_OS Credential Dumping (5:00)
21_Local Enumeration On Linux - Part 1 (5:00)
22_Local Enumeration On Linux - Part 2 (5:00)
23_Linux Privilege Escalation (1:52)
24_Exploiting Misconfigured SUID Binaries (5:00)
25_Exploiting Misconfigured SUDO Privileges (5:00)
26_Exploitation for Privilege Escalation (5:00)
27_Linux Persistence (2:15)
28_Persistence Via Cron Job (5:00)
29_Persistence Via Web Shells (5:00)
30_Pivoting Lateral Movement (1:43)
31_Pivoting With MSF (5:00)
32_Pivoting With reGeorg (5:00)
Penetration-Testing-Exploitation-and-Post-Exploitation-Tactics-Course-File
Teach online with
13_Post-Exploitation Methodology
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock