Windows Exploits and Forensics: Legacy Systems & Third Party Applications

IT Security    |    Intermediate
  • 12 videos | 57m 14s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 2 users Rating 4.5 of 2 users (2)
When an organization uses systems that are no longer serviced and supported and therefore, do not receive security updates, they expose themselves to serious security attacks. To ensure a healthy network ecosystem, security operations personnel must be aware of the vulnerabilities these systems are exposed to. In this course, you'll explore how to conduct offensive security operations against legacy Windows-based systems. You'll learn to recognize older versions of Windows, identify common exploits for these older versions, and scan Server 2008 for vulnerabilities. You'll then learn how to enumerate Server 2008, exploit legacy systems, and gain a reverse shell on a legacy system. You'll then learn how to recognize common third-party applications and vulnerabilities and how to exploit them. Finally, you'll learn how to identify and avoid a honeypot.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify common attacks against legacy windows host-based machines
    Identify common attacks against legacy windows server-based machines
    Scan a windows server 2008 environment for potential vulnerabilities
    Enumerate data from services running on windows server 2008 hosts
    Run an exploit on a windows server 2008-based machine to gain user credentials
  • Run an exploit on a windows-based machine to gain a reverse shell
    List common third-party applications used in windows environments
    Outline how to find vulnerabilities for third-party applications
    Exploit a third-party application and gain access to a system
    Recognize a honeypot and how to avoid falling into their trap
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 52s
  • 5m 47s
    Learn how to identify common attacks against legacy Windows machines. FREE ACCESS
  • Locked
    3.  Common Attacks on Windows Servers
    6m 9s
    Find out how to identify common attacks against legacy Windows Server-based machines. FREE ACCESS
  • Locked
    4.  Scanning for Potential Vulnerabilities
    6m 25s
    In this video, learn how to scan a Windows Server 2008 environment for potential vulnerabilities. FREE ACCESS
  • Locked
    5.  Enumerating Data from Services
    5m 5s
    During this video, you will learn how to enumerate data from services running on Windows Server 2008 hosts. FREE ACCESS
  • Locked
    6.  Running an Exploit to Gain Credentials
    3m 44s
    In this video, you will exploit a Windows Server 2008-based machine to gain user credentials. FREE ACCESS
  • Locked
    7.  Running an Exploit to Gain a Reverse Shell
    4m 21s
    Learn how to run an exploit on a Windows-based machine to get a reverse shell. FREE ACCESS
  • Locked
    8.  Common Third-party Applications in Windows
    5m 45s
    After completing this video, you will be able to list common third-party applications used in Windows environments. FREE ACCESS
  • Locked
    9.  Finding Vulnerabilities for Third-party Applications
    7m 43s
    In this video, you will learn how to find vulnerabilities for third-party applications. FREE ACCESS
  • Locked
    10.  Exploiting Third-party Applications in Windows
    5m 13s
    During this video, you will learn how to exploit a third-party application to gain access to a system. FREE ACCESS
  • Locked
    11.  Avoiding Honeypots
    3m 35s
    Upon completion of this video, you will be able to recognize a honeypot and how to avoid falling into its trap. FREE ACCESS
  • Locked
    12.  Course Summary
    1m 37s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 56 users Rating 4.4 of 56 users (56)
Rating 4.6 of 199 users Rating 4.6 of 199 users (199)
Rating 4.4 of 106 users Rating 4.4 of 106 users (106)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 27 users Rating 4.8 of 27 users (27)
Rating 4.5 of 15 users Rating 4.5 of 15 users (15)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)