Windows Exploits and Forensics: FTP, RDP, & Other Services

IT Security    |    Intermediate
  • 14 videos | 1h 12m 9s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
To protect an operating system, you must first know how to exploit it. This course covers some of the standard Windows services that have known exploits available for them, which can be used in offensive security operations against a Windows environment. You'll start by enumerating data from a Windows-based FTP server before practicing methods used to attack FTP services. You'll then learn how to attack IIS-based systems. Next, you'll examine the RPD protocol and learn methods of attacking the Windows RDP service. Finally, you'll investigate how WMI works and learn to exploit WMI on a Windows-based machine. This course involves conducting brute force attacks, reverse shells, and using the BlueKeep security vulnerability.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize how to exploit common windows services, such as ftp, rdp, and others
    Enumerate data from an ftp
    Outline the various methods of attacking ftp services
    Conduct a brute force attack against an ftp server
    Discover iis and how it relates to windows and ftp clients
    Use asp to gain a reverse shell on a windows machine
  • Outline what rdp is and how it works within a windows environment
    State various methods of attacking the windows rdp service
    Enumerate a windows machine using the rdp service
    Exploit an rdp system using the bluekeep vulnerability
    Describe the features of wmi and how it works
    Exploit wmi on a windows-based system
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 54s
  • 6m 18s
    After completing this video, you will be able to recognize how to exploit common Windows services, such as FTP, RDP, and others. FREE ACCESS
  • Locked
    3.  Enumerating Data from FTP
    5m 48s
    In this video, you will learn how to enumerate data from an FTP server. FREE ACCESS
  • Locked
    4.  FTP Attack Methods
    4m 26s
    In this video, you will outline the various methods of attacking FTP servers. FREE ACCESS
  • Locked
    5.  Conducting a Brute Force Attack on an FTP Server
    5m 31s
    In this video, learn how to conduct a brute force attack on an FTP server. FREE ACCESS
  • Locked
    6.  IIS with Windows and FTP Clients
    4m 12s
    Upon completion of this video, you will be able to discover IIS and how it relates to Windows and FTP Clients. FREE ACCESS
  • Locked
    7.  FTP/IIS Reverse Shell
    8m 37s
    Find out how to use ASP to get a reverse shell on a Windows machine. FREE ACCESS
  • Locked
    8.  RDP in a Windows Environment
    6m 11s
    In this video, you will outline what RDP is and how it works within a Windows environment. FREE ACCESS
  • Locked
    9.  RDP Attack Methods
    5m 11s
    Learn how to attack the Windows RDP service using various methods. FREE ACCESS
  • Locked
    10.  Enumerating Using RDP
    5m 31s
    In this video, learn how to enumerate a Windows machine using the RDP service. FREE ACCESS
  • Locked
    11.  Exploiting an RDP system Using BlueKeep
    5m 43s
    Learn how to exploit an RDP system using the BlueKeep vulnerability. FREE ACCESS
  • Locked
    12.  Working with WMI
    5m 16s
    After completing this video, you will be able to describe the features of WMI and how it works. FREE ACCESS
  • Locked
    13.  Exploiting WMI on a Windows-based System
    7m 21s
    In this video, find out how to exploit WMI on a Windows-based system. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 11s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 179 users Rating 4.6 of 179 users (179)
Rating 4.5 of 33 users Rating 4.5 of 33 users (33)
Rating 4.8 of 4 users Rating 4.8 of 4 users (4)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 2 users Rating 4.5 of 2 users (2)
Rating 4.2 of 5 users Rating 4.2 of 5 users (5)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)