Home Search Profile

Windows Privilege Escalation: Ethical Hacking Pro 2024

Focused View

4:06:47

  • 01-Course-Introduction-(5-39-).mp4
    06:16
  • 02-Course-Discord-(Important)-(2-45-).mp4
    02:45
  • 03-Resources-and-Tips-for-Success-(3-00-).html
  • 03-Resources-and-Tips-for-Success-(3-00-).mp4
    03:00
  • 04-Course-Repo.html
  • 01-Introduction-(3-27-).mp4
    03:27
  • 02-Gaining-a-Foothold-(Box-1)-(7-45-).mp4
    07:45
  • 01-System Enumeration.mp4
    07:19
  • 02-User-Enumeration-(4-02-).mp4
    04:02
  • 03-Network-Enumeration-(4-46-).mp4
    04:46
  • 04-Password-Hunting-(4-52-).mp4
    04:52
  • 05-AV-Enumeration-(5-08-).mp4
    05:08
  • 01-Automated-Tool-Overview-(11-20-).html
  • 01-Automated-Tool-Overview-(11-20-).mp4
    11:20
  • 02-Exploring-Automated-Tools-(11-07-).mp4
    11:07
  • 01-Kernel-Exploits-Overview-(3-29-).html
  • 01-Kernel-Exploits-Overview-(3-29-).mp4
    03:29
  • 02-Escalation-with-Metasploit-(4-31-).html
  • 02-Escalation-with-Metasploit-(4-31-).mp4
    04:31
  • 03-Manual-Kernel-Exploitation-(10-09-).html
  • 03-Manual-Kernel-Exploitation-(10-09-).mp4
    10:09
  • 01-Overview-(1-53-).mp4
    01:53
  • 02-Gaining-a-Foothold-(Box-2)-(8-23-).html
  • 02-Gaining-a-Foothold-(Box-2)-(8-23-).mp4
    08:23
  • 03-Escalation-via-Stored-Passwords-(18-03-).html
  • 03-Escalation-via-Stored-Passwords-(18-03-).mp4
    18:04
  • 01-Overview-(1-54-).mp4
    01:54
  • 02-Gaining-a-Foothold-(Box-3)-(15-01-).mp4
    15:02
  • 03-Escalation-via-WSL-(8-45-).html
  • 03-Escalation-via-WSL-(8-45-).mp4
    08:45
  • 01-Token-Impersonation-Overview-(4-06-).mp4
    04:06
  • 02-Impersonation-Privileges-Overview-(3-27-).mp4
    03:27
  • 03-Potato-Attacks-Overview-(2-45-).html
  • 03-Potato-Attacks-Overview-(2-45-).mp4
    02:45
  • 04-Gaining-a-Foothold-(Box-4)-(11-26-).html
  • 04-Gaining-a-Foothold-(Box-4)-(11-26-).mp4
    11:26
  • 05-Escalation-via-Potato-Attack-(2-38-).mp4
    02:38
  • 06-Alternate-Data-Streams-(2-08-).html
  • 06-Alternate-Data-Streams-(2-08-).mp4
    02:08
  • 01-getsystem-Overview-(3-54-).html
  • 01-getsystem-Overview-(3-54-).mp4
    03:54
  • 01-Overview-of-RunAs-(1-44-).mp4
    01:44
  • 02-Gaining-a-Foothold-(Box-5)-(7-53-).mp4
    07:53
  • 03-Escalation-via-RunAs-(4-33-).mp4
    04:33
  • 01-Overview-of-TryHackMe-Labs-(5-34-).html
  • 01-Overview-of-TryHackMe-Labs-(5-34-).mp4
    05:34
  • 01-Overview-of-Autoruns-(6-17-).mp4
    06:17
  • 02-Escalation-via-Autorun-(4-35-).mp4
    04:35
  • 03-AlwaysInstallElevated-Overview-and-Escalation-(7-04-).mp4
    07:04
  • 04-Overview-of-regsvc-ACL-(2-41-).mp4
    02:41
  • 05-regsvc-Escalation-(8-09-).mp4
    08:09
  • 01-Executable-Files-Overview-(4-25-).mp4
    04:25
  • 02-Escalation-via-Executable-Files-(2-40-).mp4
    02:40
  • 01-Startup-Applications-Overview-(3-13-).html
  • 01-Startup-Applications-Overview-(3-13-).mp4
    03:13
  • 02-Escalation-via-Startup-Applications-(3-58-).mp4
    03:58
  • 01-Overview-and-Escalation-via-DLL-Hijacking-(9-40-).mp4
    09:40
  • More details


    Course Overview

    Master Windows privilege escalation techniques from basic footholds to advanced system takeovers, using real-world attack methods to understand and strengthen system security.

    What You'll Learn

    • 15+ privilege escalation techniques (Potato attacks, DLL hijacking, WSL exploits)
    • System enumeration and vulnerability identification
    • Automated and manual exploitation methods

    Who This Is For

    • Aspiring penetration testers
    • System administrators securing Windows environments
    • Cybersecurity students expanding practical skills

    Key Benefits

    • Hands-on labs with realistic attack scenarios
    • Comprehensive coverage of Windows security flaws
    • Both offensive techniques and defensive countermeasures

    Curriculum Highlights

    1. Initial Access & System Enumeration
    2. Kernel Exploits & Automated Tools
    3. Advanced Techniques (Token Impersonation, Registry Attacks)
    Focused display
    • language english
    • Training sessions 42
    • duration 4:06:47
    • Release Date 2025/04/19

    Courses related to Network Security

    Courses related to Computer Network

    Subtitles
    Ultimate CCNA 200-301 Certification: Complete 2024 Prep Course
    Subtitles
    Master Network Automation: The 2024 Expert Guide
    Master Network Automation: The 2024 Expert Guide
    1:25:56
    English subtitles
    02/08/2025
    Subtitles
    Master Windows Server 2025 Group Policy Like a Pro
    Master Windows Server 2025 Group Policy Like a Pro
    1:23:45
    English subtitles
    02/09/2025

    Courses related to Network Engineering

    Courses related to Windows Server

    Subtitles
    Master Windows Server 2025 Group Policy Like a Pro
    Master Windows Server 2025 Group Policy Like a Pro
    1:23:45
    English subtitles
    02/09/2025

    Courses related to Windows 11