Windows Exploits and Forensics: Legacy Systems & Third Party Applications
IT Security
| Intermediate
- 12 videos | 57m 14s
- Includes Assessment
- Earns a Badge
When an organization uses systems that are no longer serviced and supported and therefore, do not receive security updates, they expose themselves to serious security attacks. To ensure a healthy network ecosystem, security operations personnel must be aware of the vulnerabilities these systems are exposed to. In this course, you'll explore how to conduct offensive security operations against legacy Windows-based systems. You'll learn to recognize older versions of Windows, identify common exploits for these older versions, and scan Server 2008 for vulnerabilities. You'll then learn how to enumerate Server 2008, exploit legacy systems, and gain a reverse shell on a legacy system. You'll then learn how to recognize common third-party applications and vulnerabilities and how to exploit them. Finally, you'll learn how to identify and avoid a honeypot.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify common attacks against legacy windows host-based machinesIdentify common attacks against legacy windows server-based machinesScan a windows server 2008 environment for potential vulnerabilitiesEnumerate data from services running on windows server 2008 hostsRun an exploit on a windows server 2008-based machine to gain user credentials
-
Run an exploit on a windows-based machine to gain a reverse shellList common third-party applications used in windows environmentsOutline how to find vulnerabilities for third-party applicationsExploit a third-party application and gain access to a systemRecognize a honeypot and how to avoid falling into their trapSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 52s
-
5m 47sLearn how to identify common attacks against legacy Windows machines. FREE ACCESS
-
6m 9sFind out how to identify common attacks against legacy Windows Server-based machines. FREE ACCESS
-
6m 25sIn this video, learn how to scan a Windows Server 2008 environment for potential vulnerabilities. FREE ACCESS
-
5m 5sDuring this video, you will learn how to enumerate data from services running on Windows Server 2008 hosts. FREE ACCESS
-
3m 44sIn this video, you will exploit a Windows Server 2008-based machine to gain user credentials. FREE ACCESS
-
4m 21sLearn how to run an exploit on a Windows-based machine to get a reverse shell. FREE ACCESS
-
5m 45sAfter completing this video, you will be able to list common third-party applications used in Windows environments. FREE ACCESS
-
7m 43sIn this video, you will learn how to find vulnerabilities for third-party applications. FREE ACCESS
-
5m 13sDuring this video, you will learn how to exploit a third-party application to gain access to a system. FREE ACCESS
-
3m 35sUpon completion of this video, you will be able to recognize a honeypot and how to avoid falling into its trap. FREE ACCESS
-
1m 37s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.