Windows Exploits and Forensics: SMB & PsExec

IT Security    |    Intermediate
  • 15 videos | 1h 5m 6s
  • Includes Assessment
  • Earns a Badge
Rating 4.0 of 4 users Rating 4.0 of 4 users (4)
When carrying out security operations in a Windows environment, you need to know what kind of attacks, exploits, and vulnerabilities to look out for. This course covers two of the most common services used to attack a Windows-based network - SMB and PsExec - along with some popular attack methodologies. You'll start by examining SMB permissions and default settings. You'll then explore tools to enumerate SMB shares and data. Next, you'll investigate how to identify SMB vulnerabilities and recognize SMB attacks. You'll then conduct different SMB exploits, including brute force and denial of service attacks. You'll move on to outline how PsExec works and use it to execute remote commands. Finally, you'll practice exploiting PsExec using various tools, including the EternalBlue exploit.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline how smb works and how permissions are set
    List various tools and techniques used to enumerate smb
    Enumerate smb information from an active machine
    Outline how to identify potential vulnerabilities in smb
    Outline various methods of attacking smb
    Conduct a brute force attack against an smb service
    Conduct a denial of service attack on the smb service
  • Exploit a system to gain a reverse shell on a windows machine
    Define what psexec is and describe how it works
    Use psexec to execute commands on a remote machine
    Use mimikatz to "pass the hash" and steal logon credentials
    Describe the background of the eternalblue exploit and outline how it works on windows systems
    Conduct an attack on a system using eternalblue
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 41s
  • 5m
    In this video, you will outline how SMB works and how permissions are set. FREE ACCESS
  • Locked
    3.  SMB Enumeration
    3m 45s
    After completing this video, you will be able to list various tools and techniques used to enumerate SMB shares. FREE ACCESS
  • Locked
    4.  Enumerating SMB Shares
    8m 7s
    Find out how to list SMB information from an active machine. FREE ACCESS
  • Locked
    5.  Identifying Vulnerabilities in SMB
    3m 55s
    In this video, you will learn how to identify potential vulnerabilities in SMB. FREE ACCESS
  • Locked
    6.  SMB Attack Methods
    2m 16s
    In this video, find out how to outline various methods of attacking SMB servers. FREE ACCESS
  • Locked
    7.  Conducting an SMB Brute Force Attack
    2m 49s
    In this video, find out how to conduct a brute force attack against an SMB service. FREE ACCESS
  • Locked
    8.  Conducting an SMB Denial of Service
    5m 35s
    In this video, you will conduct a denial of service attack on the SMB service. FREE ACCESS
  • Locked
    9.  Exploiting a System Using SMB Reverse Shell
    4m 20s
    Learn how to exploit a system to gain a reverse shell on a Windows machine. FREE ACCESS
  • Locked
    10.  How the PsExec Utility Works
    2m 19s
    In this video, you will learn what PsExec is and how it works. FREE ACCESS
  • Locked
    11.  Executing Remote Commands with PsTools
    5m 56s
    In this video, you will learn how to use PsExec to execute commands on a remote machine. FREE ACCESS
  • Locked
    12.  Executing a Pass the Hash Attack with Mimikatz
    9m 47s
    Learn how to use Mimikatz to "pass the hash" and steal login credentials. FREE ACCESS
  • Locked
    13.  A Background to the EternalBlue Exploit
    5m 12s
    After completing this video, you will be able to describe the background of the EternalBlue exploit and outline how it works on Windows systems. FREE ACCESS
  • Locked
    14.  Using the EternalBlue Vulnerability to Attack
    2m 54s
    In this video, you will learn how to conduct an attack on a system using the EternalBlue exploit. FREE ACCESS
  • Locked
    15.  Course Summary
    1m 31s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 65 users Rating 4.6 of 65 users (65)
Rating 4.5 of 43 users Rating 4.5 of 43 users (43)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 1527 users Rating 4.5 of 1527 users (1527)
Rating 4.8 of 19 users Rating 4.8 of 19 users (19)
Rating 4.6 of 1111 users Rating 4.6 of 1111 users (1111)