This course focuses on Windows Privilege Escalation tactics and techniques designed to help you improve your privilege escalation game. Students should take this course if they are interested in:
- Gaining a better understanding of privilege escalation techniques
- Improving Capture the Flag skillset
- Preparing for certifications such as the PNPT, OSCP, eCPPT, CEH, etc.
What will I learn?
- Kernel Exploits
- Password Hunting
- Impersonation Attacks
- Registry Attacks
- Executable Files
- Schedule Tasks
- Startup Applications
- DLL Hijacking
- Service Permissions
- Windows Subsystem for Linux
- CVE-2019-1388
Syllabus
-
Introduction
- Gaining a Foothold
- Initial Enumeration
- Exploring Automated Tools
-
Escalation Path: Kernel Exploits
- Escalation Path: Passwords and Port Forwarding
- Escalation Path: Windows Subsystem for Linux
- Impersonation and Potato Attacks
- Escalation Path: getsystem
- Escalation Path: RunAs
- Additional Labs
- Escalation Path: Registry
- Escalation Path: Executable Files
-
Escalation Path: Startup Applications
- Escalation Path: DLL Hijacking
- Escalation Path: Service Permissions (Paths)
-
Escalation Path: CVE-2019-1388
- Capstone Challenge
- Conclusion