From Kiosk To King hacking olympus
Channel:
Subscribers:
688
Published on ● Video Link: https://www.youtube.com/watch?v=beGdjC2KGHU
In this video I finally get around to hacking the Olympus lab environment. I start with a desktop breakout from a kiosk machine and work my way up to a domain admin.
The exploitation is not fancy, but this video is more a demonstration and look at some of the tools that hackers both black hat and white hat can use to gain and advantage and a foothold in a domain.
I also suffer a bit from gold fever in this video as I spend too much focus on the DC and less on the other machines discovered.
Tools:
SeBackupPrivilege CMDLETS
https://github.com/giuliano108/SeBackupPrivilege
Music:
Karl Casey @ White Bat Audio
Other Videos By Nomad Jock
2022-08-11 | Final Fight, A Retrospective |
2022-08-04 | R-type, A Retrospective |
2022-07-28 | Double Dragon, A Retrospective |
2022-07-21 | Golden Axe, A Retrospective |
2022-07-15 | Gynoug, A Retrospective |
2022-07-15 | Travelling down south to London |
2022-07-08 | Rambo III on the Megadrive, A Retrospective |
2022-07-01 | Altered Beast, A Retrospective |
2022-06-24 | Commando, A Retrospective |
2022-06-17 | The Way Of The Exploding Fist, A Retrospective |
2022-06-09 | From Kiosk To King hacking olympus |
2022-06-03 | The Intel NUC Dragon Canyon build |
2022-05-27 | Dell T7500 Gets A Long Overdue Upgrade |
2021-09-17 | My Journey Through The Golden Age Of Video Games Part 3 |
2021-09-10 | My Journey Through The Golden Age Of Video Games Part 2 |
2021-09-03 | My Journey Through The Golden Age Of Video Games Part 1 |
2021-06-25 | New addition to my console collection |
2021-05-01 | My time working at DXC by the numbers |
2021-01-01 | Old replays from Gran Turismo 3 on the PS2 |
2020-12-29 | Bypassing Application Whitelisting with GreatSCT |
2020-10-24 | Time Lapse of Drive to Stockton-On-Tees |
Tags:
Hacking
Ethical Hacking
PWNED
Desktop Breakout
Responder
evil-winrm
OSCP
exploit
pentesting
penetration testing
tutorial
technology
offensive security kali
oscp training
oscp preparation
privilege escalation
priv esc
methodology
windows
oscp privilege escalation
local privilege escalation
cyber security
cybersecurity for beginners
pentest
infosec
sebackup
sebackupprivilege
shadowcopy
windows priv esc
windows privilege escalation
backupprivilege
serestoreprivilege