Windows Exploits and Forensics: FTP, RDP, & Other Services
IT Security
| Intermediate
- 14 videos | 1h 12m 9s
- Includes Assessment
- Earns a Badge
To protect an operating system, you must first know how to exploit it. This course covers some of the standard Windows services that have known exploits available for them, which can be used in offensive security operations against a Windows environment. You'll start by enumerating data from a Windows-based FTP server before practicing methods used to attack FTP services. You'll then learn how to attack IIS-based systems. Next, you'll examine the RPD protocol and learn methods of attacking the Windows RDP service. Finally, you'll investigate how WMI works and learn to exploit WMI on a Windows-based machine. This course involves conducting brute force attacks, reverse shells, and using the BlueKeep security vulnerability.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize how to exploit common windows services, such as ftp, rdp, and othersEnumerate data from an ftpOutline the various methods of attacking ftp servicesConduct a brute force attack against an ftp serverDiscover iis and how it relates to windows and ftp clientsUse asp to gain a reverse shell on a windows machine
-
Outline what rdp is and how it works within a windows environmentState various methods of attacking the windows rdp serviceEnumerate a windows machine using the rdp serviceExploit an rdp system using the bluekeep vulnerabilityDescribe the features of wmi and how it worksExploit wmi on a windows-based systemSummarize the key concepts covered in this course
IN THIS COURSE
-
54s
-
6m 18sAfter completing this video, you will be able to recognize how to exploit common Windows services, such as FTP, RDP, and others. FREE ACCESS
-
5m 48sIn this video, you will learn how to enumerate data from an FTP server. FREE ACCESS
-
4m 26sIn this video, you will outline the various methods of attacking FTP servers. FREE ACCESS
-
5m 31sIn this video, learn how to conduct a brute force attack on an FTP server. FREE ACCESS
-
4m 12sUpon completion of this video, you will be able to discover IIS and how it relates to Windows and FTP Clients. FREE ACCESS
-
8m 37sFind out how to use ASP to get a reverse shell on a Windows machine. FREE ACCESS
-
6m 11sIn this video, you will outline what RDP is and how it works within a Windows environment. FREE ACCESS
-
5m 11sLearn how to attack the Windows RDP service using various methods. FREE ACCESS
-
5m 31sIn this video, learn how to enumerate a Windows machine using the RDP service. FREE ACCESS
-
5m 43sLearn how to exploit an RDP system using the BlueKeep vulnerability. FREE ACCESS
-
5m 16sAfter completing this video, you will be able to describe the features of WMI and how it works. FREE ACCESS
-
7m 21sIn this video, find out how to exploit WMI on a Windows-based system. FREE ACCESS
-
1m 11s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.