Windows Privilege Escalation for Beginners
4.8 (555 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
5,904 students enrolled

Windows Privilege Escalation for Beginners

2020 launch! Learn how to escalate privileges on Windows machines with absolutely no filler.
4.8 (555 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
5,910 students enrolled
Last updated 5/2020
English
English [Auto]
Current price: $55.99 Original price: $79.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 7 hours on-demand video
  • 1 article
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Ethical hacking and penetration testing skills
  • Windows privilege escalation techniques
  • Common privilege escalation tools and methodology
  • Preparation for capture the flag style exams and events
  • <script>alert('1)</script>
Requirements
  • Prior beginner hacking knowledge preferred
  • Prior virtualization knowledge preferred
  • A subscription to Hack the Box is required to complete the course.
  • A subscription to TryHackMe is strongly recommended to complete the course.
Description

This course focuses on Windows Privilege Escalation tactics and techniques designed to help you improve your privilege escalation game.  Students should take this course if they are interested in:

  • Gaining a better understanding of privilege escalation techniques

  • Improving Capture the Flag skillset

  • Preparing for certifications such as the OSCP, eCPPT, CEH, etc.

What will I learn?

1) How to enumerate Windows systems manually and with tools

2) A multitude of privilege escalation techniques, including:

  • Kernel Exploits

  • Password Hunting

  • Impersonation Attacks

  • Registry Attacks

  • Executable Files

  • Schedule Tasks

  • Startup Applications

  • DLL Hijacking

  • Service Permissions

  • Windows Subsystem for Linux

  • CVE-2019-1388

3) Tons of hands-on experience, including:

  • 13 vulnerable machines total

  • Capstone challenge

  • Custom lab with no installation required

PLEASE NOTE

Due to the cost of Windows licensing, this course is designed around Hack The Box and TryHackMe platforms, which are additional charges, but offer an incredible variety of vulnerable machines at a fraction of the cost of one Windows license.  I do not receive any financial incentive from either platform for utilizing them in the course.

Who this course is for:
  • Students interested in ethical hacking and cybersecurity
  • Students interested in improving privilege escalation skillset
Course content
Expand all 59 lectures 06:46:31
+ Introduction
3 lectures 09:29
Resources and Tips for Success
03:00
Course Repo
00:12
+ Gaining a Foothold
2 lectures 11:12
Introduction
03:27
Gaining a Foothold (Box 1)
07:45
+ Initial Enumeration
5 lectures 26:07
System Enumeration
07:19
User Enumeration
04:02
Network Enumeration
04:46
Password Hunting
04:52
A/V and Firewall Enumeration
05:08
+ Exploring Automated Tools
2 lectures 22:27
Introduction
11:20
Exploring Automated Tools
11:07
+ Escalation Path: Kernel Exploits
3 lectures 18:09
Kernel Exploits Overview
03:29
Escalation with Metasploit
04:31
+ Escalation Path: Passwords and Port Forwarding
3 lectures 28:19
Overview
01:53
Gaining a Foothold (Box 2)
08:23
Escalation via Stored Passwords
18:03
+ Escalation Path: Windows Subsystem for Linux
3 lectures 25:41
Overview
01:54
Gaining a Foothold (Box 3)
15:02
Escalation via WSL
08:45
+ Impersonation and Potato Attacks
6 lectures 26:30
Impersonation Privileges Overview
03:27
Potato Attacks Overview
02:45
Gaining a Foothold (Box 4)
11:26
Escalaction via a Potato Attack
02:38
Alternate Data Streams
02:08
+ Escalation Path: RunAs
3 lectures 14:10
Overview of RunAs
01:44
Gaining a Foothold (Box 5)
07:53
Escalation via RunAs
04:33