Pentesting 102: Introductory Post-Exploitation

Pentesting 102: Introductory Post-Exploitation

$299.00
{{option.name}}: {{selected_options[option.position]}}
{{value_obj.value}}

In this follow-up to our Pentesting 102 course, we will learn how to transition from gaining an initial network foothold to achieving full compromise of a modern Active Directory domain. We will begin with a conceptual overview of modern internal network pentesting objectives and methodologies. We will then shift gears into hands-on local reconnaissance exercises, focusing on techniques such as SPN enumeration, active directory queries, and SMB hunting. Once we've finished gaining situational awareness within the local environment, we will dive into a selection of local privilege escalation, credential access, and persistence techniques. Finally, we will cover lateral movement and privilege escalation within the Active Directory domain. Make no mistake, this is a Modern Ethical Hacking course focused on current technologies and includes attacks on Windows 11 and many other platforms, services, and OS's.  Author: Gabriel Ryan @s0lst1c3 Release Date: Released, order and access instantly!

Show More Show Less