Windows Exploits and Forensics: SMB & PsExec
IT Security
| Intermediate
- 15 videos | 1h 5m 6s
- Includes Assessment
- Earns a Badge
When carrying out security operations in a Windows environment, you need to know what kind of attacks, exploits, and vulnerabilities to look out for. This course covers two of the most common services used to attack a Windows-based network - SMB and PsExec - along with some popular attack methodologies. You'll start by examining SMB permissions and default settings. You'll then explore tools to enumerate SMB shares and data. Next, you'll investigate how to identify SMB vulnerabilities and recognize SMB attacks. You'll then conduct different SMB exploits, including brute force and denial of service attacks. You'll move on to outline how PsExec works and use it to execute remote commands. Finally, you'll practice exploiting PsExec using various tools, including the EternalBlue exploit.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline how smb works and how permissions are setList various tools and techniques used to enumerate smbEnumerate smb information from an active machineOutline how to identify potential vulnerabilities in smbOutline various methods of attacking smbConduct a brute force attack against an smb serviceConduct a denial of service attack on the smb service
-
Exploit a system to gain a reverse shell on a windows machineDefine what psexec is and describe how it worksUse psexec to execute commands on a remote machineUse mimikatz to "pass the hash" and steal logon credentialsDescribe the background of the eternalblue exploit and outline how it works on windows systemsConduct an attack on a system using eternalblueSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 41s
-
5mIn this video, you will outline how SMB works and how permissions are set. FREE ACCESS
-
3m 45sAfter completing this video, you will be able to list various tools and techniques used to enumerate SMB shares. FREE ACCESS
-
8m 7sFind out how to list SMB information from an active machine. FREE ACCESS
-
3m 55sIn this video, you will learn how to identify potential vulnerabilities in SMB. FREE ACCESS
-
2m 16sIn this video, find out how to outline various methods of attacking SMB servers. FREE ACCESS
-
2m 49sIn this video, find out how to conduct a brute force attack against an SMB service. FREE ACCESS
-
5m 35sIn this video, you will conduct a denial of service attack on the SMB service. FREE ACCESS
-
4m 20sLearn how to exploit a system to gain a reverse shell on a Windows machine. FREE ACCESS
-
2m 19sIn this video, you will learn what PsExec is and how it works. FREE ACCESS
-
5m 56sIn this video, you will learn how to use PsExec to execute commands on a remote machine. FREE ACCESS
-
9m 47sLearn how to use Mimikatz to "pass the hash" and steal login credentials. FREE ACCESS
-
5m 12sAfter completing this video, you will be able to describe the background of the EternalBlue exploit and outline how it works on Windows systems. FREE ACCESS
-
2m 54sIn this video, you will learn how to conduct an attack on a system using the EternalBlue exploit. FREE ACCESS
-
1m 31s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.