Windows Red Team Exploitation Techniques | Red Team Series 3-13

Subscribers:
1,040,000
Published on ● Video Link: https://www.youtube.com/watch?v=UV82Ft63ZG8



Category:
Guide
Duration: 47:17
2,214 views
51


This guide is part of the HackerSploit Red Team series of guides. In this video, we will cover Exploitation Techniques for Windows systems. Techniques used to gain a foothold include targeted spear phishing and exploiting weaknesses on public-facing web servers. Footholds gained through initial access may allow for continued access, like valid accounts and use of external remote services, or may be limited use due to changing passwords.

Chapters:
0:00 Introduction
0:43 What We’ll Be Covering
1:24 Mitre Attack Initial Access
2:42 A Note About Phishing
3:17 Our Methodologies
6:06 Let’s get Started
6:15 Setting Up Our Infrastructure (Empire & Starkiller)
8:12 Start the Powershell Empire Server
9:18 Start the Powershell Empire Client
9:46 Initializing Starkiller
10:48 Examining the Starkiller UI
11:00 Enable the csharpserver Plugin
12:47 Installing Luckystrike
15:39 Installing Module Invoke-Obfuscation
17:00 Loading the Module into PowerShell
20:14 How to use Luckystrike
22:04 Generating our Payloads
31:32 Download our Payloads
32:06 Working with Luckystrike
38:09 Executing our Payloads
39:46 Remotely Executing Exploits via Modules
43:13 Brief Chat about Phishing
44:05 Brief Chat about Additional Stagers
45:57 Why We Didn’t Talk About Encoding or Obfuscation
46:36 Conclusion

New to Linode? Get started here with a $100 credit → https://www.linode.com/linodetube
Read the doc for more information on Recon Techniques → https://www.linode.com/docs/guides/windows-red-team-exploitation-techniques/
Learn more about Hackersploit https://www.linode.com/docs/guides/hackersploit-red-team-series/
Subscribe to get notified of new episodes as they come out → https://www.youtube.com/linode?sub_confirmation=1

#Linode #Security #RedTeam #Hackersploit
Product: Linode, Security, Red Team; Hackersploit;




Other Videos By Akamai Developer


2022-04-11Windows Red Team Credential Access Techniques | Red Team Series 6-13
2022-04-08High Availability Explained | How to Upgrade to High Availability with Linode Kubernetes Engine
2022-04-06Intro to MySQL For Beginners Part 1 | Common Commands
2022-04-05Running a basic Ansible Playbook installing Nginx #shorts
2022-04-04Windows Red Team Persistence Techniques | Red Team Series 5-13
2022-04-01RocketChat | Fast, Secure, Open Source Communication
2022-03-30Managing Your Own Databases is a Task of the Past with Linode's Managed Database Platform
2022-03-28Linux Red Team Exploitation Techniques | Red Team Series 4-13
2022-03-25Installing TensorFlow on an Ubuntu Server
2022-03-23Speed Up Your SSH Sessions with These Seven Quick SSH Config Tricks
2022-03-21Windows Red Team Exploitation Techniques | Red Team Series 3-13
2022-03-18Connect Your Docker Containers to Domain Names For Easy Access using Portainer on Linode
2022-03-16How to Reset SSH Host Keys when Deploying Linux Templates in Proxmox
2022-03-14Red Team Recon Techniques | Red Team Series 2-13
2022-03-11Linode Dedicated CPUs Explained | Dedicated vs Shared CPU Instances
2022-03-10Use Terraform for FAST Automated deployments #shorts
2022-01-24Manage Docker Containers from a Web UI with Yacht Interactive Dashboards
2022-01-21Choosing the Right Linux Distribution | Pros & Cons of the Top 7 Server Distros
2022-01-19aapanel is a Free and Open-Source Web Hosting Control Panel | Easy Install on Linode
2022-01-14Git on Linux Simplified | How to Setup Your First Repository and Use Version Control
2022-01-12How to use External Storage on Nextcloud with Linode's Super Fast NVMe Block Storage



Tags:
linode
linux
cloud computing
alternative cloud
linux server
open source
sysadmin
mitre att&ck
mitre att&ck framework
mitre att&ck framework tutorial
exploit
starkiller kali linux
empire kali linux
powershell-empire kali
csharpserver
luckystrike kali
luckystrike windows
invoke-obfuscation
luckystrike payload
create payloads
luckystrike
starkiller stager
red team
powershell exploit
exploitation techniques
kali linux hacking tutorials
white hat