17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Post Exploitation With PowerShell
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
After gaining access to a server in a red team engagement, your next step is to escalate your privileges and establish persistence. This course will teach you post-exploitation techniques with PowerShell.
In a red team engagement, after getting initial access to your target environment, you need to escalate your privileges, establish persistence and execute your goals. As your objective is to stay stealthy, the best option is to leverage Windows native features, such as PowerShell, to conduct your post-exploitation activities. In this course, Post-Exploitation with PowerShell, you’ll learn how to execute all your post-exploitation activities using only Windows native commands. First, you’ll explore how to escalate your privileges in the compromised system. Next, you’ll discover how to create persistence so you can access the system at any time. Finally, you’ll learn how to collect and exfiltrate sensitive data. When you’re finished with this course, you’ll have the skills and knowledge of PowerShell needed to perform post-exploitation on a red team.
Homepage
If You Need More Stuff, kindly Visit and Support Us -->> https://DevCourseWeb.com
Get More Tutorials and Support Us -->> https://CourseWikia.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4
4.4 MB
~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt
1.9 KB
~Get Your Files Here !/2. Local Privilege Escalation/1. Understanding Post-exploitation.mp4
16.3 MB
~Get Your Files Here !/2. Local Privilege Escalation/1. Understanding Post-exploitation.vtt
15.3 KB
~Get Your Files Here !/2. Local Privilege Escalation/2. Finding Misconfigured Permissions.mp4
19.1 MB
~Get Your Files Here !/2. Local Privilege Escalation/2. Finding Misconfigured Permissions.vtt
12.5 KB
~Get Your Files Here !/2. Local Privilege Escalation/3. Unquoted Service Paths.mp4
17.5 MB
~Get Your Files Here !/2. Local Privilege Escalation/3. Unquoted Service Paths.vtt
9.2 KB
~Get Your Files Here !/2. Local Privilege Escalation/4. Finding Missing Patches and Outdated Software.mp4
6.5 MB
~Get Your Files Here !/2. Local Privilege Escalation/4. Finding Missing Patches and Outdated Software.vtt
5.5 KB
~Get Your Files Here !/2. Local Privilege Escalation/5. Leveraging Credentials and Hashes with PowerShell.mp4
20.9 MB
~Get Your Files Here !/2. Local Privilege Escalation/5. Leveraging Credentials and Hashes with PowerShell.vtt
8.8 KB
~Get Your Files Here !/2. Local Privilege Escalation/6. Escalating from Administrator to System.mp4
7.3 MB
~Get Your Files Here !/2. Local Privilege Escalation/6. Escalating from Administrator to System.vtt
5.8 KB
~Get Your Files Here !/2. Local Privilege Escalation/7. Using PowerShell Frameworks.mp4
11 MB
~Get Your Files Here !/2. Local Privilege Escalation/7. Using PowerShell Frameworks.vtt
7.7 KB
~Get Your Files Here !/3. Creating Persistence/1. Understanding Persistence with PowerShell.mp4
6.9 MB
~Get Your Files Here !/3. Creating Persistence/1. Understanding Persistence with PowerShell.vtt
6 KB
~Get Your Files Here !/3. Creating Persistence/2. Creating Scheduled Tasks.mp4
11.7 MB
~Get Your Files Here !/3. Creating Persistence/2. Creating Scheduled Tasks.vtt
8 KB
~Get Your Files Here !/3. Creating Persistence/3. Creating Hidden Services.mp4
7.3 MB
~Get Your Files Here !/3. Creating Persistence/3. Creating Hidden Services.vtt
6.2 KB
~Get Your Files Here !/3. Creating Persistence/4. WMI Backdoors.mp4
9.1 MB
~Get Your Files Here !/3. Creating Persistence/4. WMI Backdoors.vtt
7.2 KB
~Get Your Files Here !/3. Creating Persistence/5. WinRM for Remote Code Execution.mp4
7.9 MB
~Get Your Files Here !/3. Creating Persistence/5. WinRM for Remote Code Execution.vtt
6.6 KB
~Get Your Files Here !/3. Creating Persistence/6. Persistent Remote Web Shells.mp4
6.1 MB
~Get Your Files Here !/3. Creating Persistence/6. Persistent Remote Web Shells.vtt
5.9 KB
~Get Your Files Here !/3. Creating Persistence/7. Exploring PowerShell Frameworks.mp4
12.5 MB
~Get Your Files Here !/3. Creating Persistence/7. Exploring PowerShell Frameworks.vtt
9 KB
~Get Your Files Here !/4. Collection and Exfiltration/1. Understanding Collection and Exfiltration.mp4
8.3 MB
~Get Your Files Here !/4. Collection and Exfiltration/1. Understanding Collection and Exfiltration.vtt
7.8 KB
~Get Your Files Here !/4. Collection and Exfiltration/2. Eavesdropping on Network Traffic with PowerShell.mp4
8.9 MB
~Get Your Files Here !/4. Collection and Exfiltration/2. Eavesdropping on Network Traffic with PowerShell.vtt
6.1 KB
~Get Your Files Here !/4. Collection and Exfiltration/3. Collecting Users, Groups, and Sensitive Files.mp4
14.7 MB
~Get Your Files Here !/4. Collection and Exfiltration/3. Collecting Users, Groups, and Sensitive Files.vtt
11.7 KB
~Get Your Files Here !/4. Collection and Exfiltration/4. PowerShell Post Exploitation.mp4
10.1 MB
~Get Your Files Here !/4. Collection and Exfiltration/4. PowerShell Post Exploitation.vtt
8 KB
~Get Your Files Here !/4. Collection and Exfiltration/5. Exfiltrating Files Over HTTP and DNS.mp4
17.9 MB
~Get Your Files Here !/4. Collection and Exfiltration/5. Exfiltrating Files Over HTTP and DNS.vtt
12.6 KB
~Get Your Files Here !/4. Collection and Exfiltration/6. Course Closure.mp4
5.3 MB
~Get Your Files Here !/4. Collection and Exfiltration/6. Course Closure.vtt