Learning Outcome:
Requirement:
Course Curriculum
Recipe 5: Things to do after exploiting the machine
Available in
days
days
after you enroll
-
Start
Understand the Post Exploitation; explain; pivoting, lateral movement, backdooring (persistent), privilege escalation
(4:43)
-
Start
Post Exploitation using Meterpreter
(7:07)
-
Start
Post Exploitation using Meterpreter contin
(11:33)
-
Start
Windows & Linux Profiling
(12:44)
-
Start
Bypassing UAC & Local Pri
(16:10)
-
Start
Post Exploitation using Mimikatz
(9:31)
-
Preview
Mimikatz in Action
(9:10)
-
Start
Cheat sheet
-
StartUnderstand the Post Exploitation; explain; pivoting, lateral movement, backdooring (persistent), privilege escalation (4:43)
-
StartPost Exploitation using Meterpreter (7:07)
-
StartPost Exploitation using Meterpreter contin (11:33)
-
StartWindows & Linux Profiling (12:44)
-
StartBypassing UAC & Local Pri (16:10)
-
StartPost Exploitation using Mimikatz (9:31)
-
PreviewMimikatz in Action (9:10)
-
StartCheat sheet
Your Instructor
Irfan Shakeel
Irfan Shakeel, the founder of the ehacking project, also hosts classes at EH Academy. He has found many vulnerabilities in the world’s known platforms, he has been providing IT security training since 2010. You might have read his articles and opinion on IBM Developers, Infosec Institute, AlienVault, EH Academy and other known blogs. Follow him on Twitter, LinkedIn and Quora.
Reviews
Your Instructor
Irfan Shakeel, the founder of the ehacking project, also hosts classes at EH Academy. He has found many vulnerabilities in the world’s known platforms, he has been providing IT security training since 2010. You might have read his articles and opinion on IBM Developers, Infosec Institute, AlienVault, EH Academy and other known blogs. Follow him on Twitter, LinkedIn and Quora.
Course Curriculum
-
StartUnderstand the Post Exploitation; explain; pivoting, lateral movement, backdooring (persistent), privilege escalation (4:43)
-
StartPost Exploitation using Meterpreter (7:07)
-
StartPost Exploitation using Meterpreter contin (11:33)
-
StartWindows & Linux Profiling (12:44)
-
StartBypassing UAC & Local Pri (16:10)
-
StartPost Exploitation using Mimikatz (9:31)
-
PreviewMimikatz in Action (9:10)
-
StartCheat sheet