Это видео недоступно.
Сожалеем об этом.

Windows Red Team Exploitation Techniques | Luckystrike & PowerShell Empire

Поделиться
HTML-код
  • Опубликовано: 30 окт 2021
  • In this video, I will be exploring the various Windows Red Team exploitation techniques that can be used for initial access. I will be demonstrating the process of creating a malicious macro document for phishing and how to set up a C2 (Command and Control) server with PowerShell Empire & Starkiller.
    Empire is a post-exploitation framework, that supports various Operating Systems (OS). Windows is purely implemented in PowerShell _(without `powershell.exe`!)_, and Linux/macOS is done in Python 3. Feature-rich with various options to bypass various protections _(and allows for easy modification for custom evasion), Empire is often a favorite for Command and Control (C2) activity.
    Luckystrike is a PowerShell-based utility for the creation of malicious Office macro documents. To be used for pen-testing or educational purposes only.
    -----------------------------------------------------------------------------------
    LINKS:
    Register for part 2 (FREE!): event.on24.com/wcc/r/3464946/...
    Get $100 in free Linode credit: login.linode.com/signup?promo...
    MITRE ATT&CK Framework: attack.mitre.org/
    TOOLS:
    Luckystrike: github.com/curi0usJack/luckys...
    PowerShell Empire: www.kali.org/blog/empire-star...
    -----------------------------------------------------------------------------------
    BLOG ►► bit.ly/3qjvSjK
    FORUM ►► bit.ly/39r2kcY
    ACADEMY ►► bit.ly/39CuORr
    -----------------------------------------------------------------------------------
    TWITTER ►► bit.ly/3sNKXfq
    DISCORD ►► bit.ly/3hkIDsK
    INSTAGRAM ►► bit.ly/3sP1Syh
    LINKEDIN ►► bit.ly/360qwlN
    PATREON ►► bit.ly/365iDLK
    MERCHANDISE ►► bit.ly/3c2jDEn
    -----------------------------------------------------------------------------------
    CYBERTALK PODCAST ►► open.spotify.com/show/6j0RhRi...
    -----------------------------------------------------------------------------------
    We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
    -----------------------------------------------------------------------------------
    Thanks for watching!
    Благодарю за просмотр!
    Kiitos katsomisesta
    Danke fürs Zuschauen!
    感谢您观看
    Merci d'avoir regardé
    Obrigado por assistir
    دیکھنے کے لیے شکریہ
    देखने के लिए धन्यवाद
    Grazie per la visione
    Gracias por ver
    شكرا للمشاهدة
    -----------------------------------------------------------------------------------
    #RedTeam#CyberSecurity

Комментарии • 80

  • @Child0ne
    @Child0ne 2 года назад +25

    Dam man you are killing it lately with the content. Good job, thank you

  • @F.M671
    @F.M671 2 года назад +1

    I love your content man. Straight to the point, practical ,KISS , Will definitely become a better pentester w your channel.

  • @mahimabhati
    @mahimabhati 2 года назад +4

    Great content pls continue I haven't seen anyone is doing this much for community
    Thank you

  • @desigamer346
    @desigamer346 2 года назад +6

    Sir great work 👍 in free of cost we are very grateful to have you 🙏

  • @shidypix8726
    @shidypix8726 2 года назад +5

    No words alive that I can use to thank you and the effort you put in just to deliver this bowl of gold for us ..... Thanks alot God Bless You we appreciate

  • @EnlightTheHack
    @EnlightTheHack 2 года назад

    The starting music gives me goosebump
    And the level of content is insane
    Thankyou Alexis
    Love from India

  • @carl76848
    @carl76848 2 года назад +1

    Awesome bro just keep posting this series 💯

  • @juul216
    @juul216 2 года назад

    Nice insight in how a c2 works thanks

  • @mohadioum3314
    @mohadioum3314 2 года назад

    Sir I swear to god you're the best keep it good and thank you

  • @code.islife493
    @code.islife493 2 года назад +2

    Tldr; windows defender > powershell empire.
    When Windows defender comes through, it's crushing everything in this video. Great intro video, but kids, exploitation is soooooo much harder than it looks! This road takes dedication.

  • @russianbear3343
    @russianbear3343 2 года назад

    Good work done. congrats!!!

  • @michaeltrokkoudes3831
    @michaeltrokkoudes3831 2 года назад

    Great content!!! Thank you!

  • @rudrasalaria3431
    @rudrasalaria3431 2 года назад

    You're really good. Your videos are always insane. Thank U Sir. Lots of Love from India. 🇮🇳

    • @rajadityashrivastava7396
      @rajadityashrivastava7396 Год назад

      Rudra can you please tell me how can I extract hashes of desired file in Linux mint or kali ??

  • @robinsaifullah6692
    @robinsaifullah6692 2 года назад

    gr8 content man..thank you so much

  • @stillunknown5785
    @stillunknown5785 2 года назад

    ❤️ Thanks Man keep making Great content

  • @mhasisetuobelho2086
    @mhasisetuobelho2086 2 года назад

    awesome and super informative tnx
    keep the good work going \

  • @hannahprobably5765
    @hannahprobably5765 2 года назад

    Alexis ur the man, huge thanks

  • @justjuicecompany2152
    @justjuicecompany2152 2 года назад

    Love the content. How do you get your kali terminal prompt like that?

  • @0xdamian816
    @0xdamian816 2 года назад

    This is good content.

  • @danishbutt6975
    @danishbutt6975 2 года назад +2

    Best forever 😘

  • @8080VB
    @8080VB 2 года назад

    True GEM !

  • @korovamilkplus
    @korovamilkplus Год назад +1

    Another fantastic video for this wonderful course!
    Unfortunately I can't get the payload path into LuckyStrike, despite the fact that I have tried both writing it in lower case and changing the payload position.
    Anyway, thank you very much Alexis!
    Ps: does anyone know an alternative to LuckyStrike for Linux?

  • @DArkZpiNer
    @DArkZpiNer 2 года назад +1

    Where's the encode Shikata ga nai video? Good video!!

  • @fuadmonsoon
    @fuadmonsoon 2 года назад

    Hello, do you teach this in Ethical Hacking training on your website?

  • @mrri8403
    @mrri8403 2 года назад

    Hello sir I tried the methods for creating the malicious macros using lucky strike but they keep getting flagged by av, I even bought commercial software to obfuscate the macros but same result . is it the fact that I’m using meterpreter as my payload?

  • @ishitadubey6334
    @ishitadubey6334 2 года назад

    How are you able to access local server of Kali VM on Windows VM? Please specify the network setting of both the VMs as I am unable to open Kali local server on Windows. I am using the command python -m SimpleHTTPServer 8080 on Kali VM.

  • @awdwadawda352
    @awdwadawda352 2 года назад +1

    Thank you so much for your content and FREE!
    Do you have a patreon or something?

    • @init_6415
      @init_6415 2 года назад

      Yah he does have patreon, look at the video description

  • @bloodgracet5640
    @bloodgracet5640 2 года назад +1

    Hackersploit: could you make a video in the future about using Cobalt Strike in the red teaming environment? Ive noticed a lack of cobalt strike videos, when from what Ive seen C.S. is a very powerful tool for penetration testing?

    • @lulztigre
      @lulztigre Год назад +1

      it's expensive so generally not many people can afford it

    • @bloodgracet5640
      @bloodgracet5640 Год назад +1

      @@lulztigre yes I know thanks

  • @Ashishkumar-mw1gj
    @Ashishkumar-mw1gj 2 года назад +2

    Buddy all courses available

  • @ghostprime5736
    @ghostprime5736 4 месяца назад

    which version of office is compatible

  • @systemnetworkh2442
    @systemnetworkh2442 Год назад

    but hackers need to disable windows defender... so this exploitation doesn t still work ?

  • @IgniteMotiverse
    @IgniteMotiverse 2 года назад +1

    Hai, how to download these videos?

  • @lulztigre
    @lulztigre Год назад

    whats the difference between Http listener and TCP?

  • @avihaichuk
    @avihaichuk Год назад +1

    For some reason starkiller is not build/cant be install on kali linux.. there is any idea for that?

  • @user-js1gj5yw2x
    @user-js1gj5yw2x 7 месяцев назад

    i will be happy if you do the phishing tutorial and put on your website

  • @chiranjeevinaidu3660
    @chiranjeevinaidu3660 2 года назад +1

    Hello hackersploit
    I wanted to ask uf ther is a detailed book on this topic
    Thank you
    Morpheuslord

  • @mrniko1340
    @mrniko1340 2 года назад

    i love u u so good

  • @piplupsingh5993
    @piplupsingh5993 5 месяцев назад

    The url for part 2 is not working

  • @xsTaoo
    @xsTaoo Год назад

    The “starkiller” cannot be opened, and the system prompts that “powershell-empire” has been installed, what should I do ε(┬┬﹏┬┬)3

  • @yasaswigrandhi5043
    @yasaswigrandhi5043 2 года назад +2

    The part2 link will be available for long time?

  • @systemnetworkh2442
    @systemnetworkh2442 Год назад

    english is not my mother tongue , I also understood that we can utilise that on other OS than windows ?

  • @rayane2290
    @rayane2290 2 года назад

    Mm si va faloir stop d rvz . Bien k hack pr soc ktaim bien russ par ex ?

  • @Umairmalik-kf3dh
    @Umairmalik-kf3dh 2 года назад

    Sir can u please how we can smooth kali linux working like your kali

    • @abidv.0.1
      @abidv.0.1 2 года назад

      hahaha still talking about performance

  • @rayane2290
    @rayane2290 2 года назад

    Cnfince en tw pr dns 3 an hacker pr lcompte de ...

  • @rahulramteke3338
    @rahulramteke3338 2 года назад +1

    4:16 youtube sucks
    Good content tho

  • @wickhere7996
    @wickhere7996 2 года назад

    So you are just covering OSCP am i right? ;)

  • @theg4925
    @theg4925 2 года назад +1

    Sir, can i ask, how can i study cybersecurity and go for a job without college degree??

    • @theg4925
      @theg4925 2 года назад

      @hackR Sir i beg to differ, my question's context was to ask for a roadmap if any for pursuing cyber security without college to upto Employer's level

    • @theg4925
      @theg4925 2 года назад

      @hackR Sir, it seems you are indeed involved in exquisite way in this field. Would u mind, answering me a few queries when u have time at ur convenience over fb or any other thing u like??
      btw i'm interested in Network hacking,i find it very intimidating and rewarding at the same time

  • @poonambisht2697
    @poonambisht2697 2 года назад +1

    His voice is just🥵

    • @HackerSploit
      @HackerSploit  2 года назад +3

      Is that a good thing?

    • @poonambisht2697
      @poonambisht2697 2 года назад +1

      @@HackerSploit yes .... It feels like a Top FBI agent or a boss of some Hackers group of Russia 😝🤩

  • @kingsmonarch4591
    @kingsmonarch4591 2 года назад

    Sorry to say sir
    You got that right in a amazing way but this isn't working in real life because windows defender is disabled 😤😤😤

  • @Ganeki-san
    @Ganeki-san 2 года назад

    Hey, Love your video and I even registered and looked at your part 2 but looks like there is an issue.
    LuckyStrike doesn't get past AV (Defender). Not for .exes (even non-malicious ones I tested) and not for powershell scripts (also non-malicious and even non-detectable malicious ones like the net cat backdoor you obfsucated in part 2, on its own it works around AV but when put into a macro via LuckyStrike its detected).
    sense LuckyStrike is apparently dead and doesn't work for macro generation, do you know of a new source that does or any basic VBA scripts that work? (When I saw work I mean can execute even non-malicious exes and powershell scripts).

    • @HackerSploit
      @HackerSploit  2 года назад

      Hello, we will cover AV evasion as we progress.

  • @know_my_name
    @know_my_name 2 года назад

    Windows disliked this ;))

  • @rayane2290
    @rayane2290 Год назад

    it means that the target has to disable his anti virus lol ????

  • @rayane2290
    @rayane2290 2 года назад

    tpass jms à l action m a dit

  • @deveshsaini3139
    @deveshsaini3139 2 года назад

    First view here......

  • @Lohitjethwani
    @Lohitjethwani 2 года назад

    20th view :)

  • @debdwaipayankarmakar9560
    @debdwaipayankarmakar9560 2 года назад

    Miss the face cam

  • @ghostprime5736
    @ghostprime5736 4 месяца назад

    ?

  • @rayane2290
    @rayane2290 2 года назад

    À amin et keep dans ce SEUL truk pr pa decu ke 2 h cam no surtt. Pa dans un an. Stop les truks pr rien. Et patienttt patiennnttt dns ce truk bnhm mais keep

  • @indradas4197
    @indradas4197 2 года назад

    Moscow wants your location :cv

  • @mohannadmhadi3903
    @mohannadmhadi3903 2 года назад

    jdjjd

  • @loverafghan4110
    @loverafghan4110 2 года назад

    أنا أموت من الفرحه إذا جاني متابع جديد 😭😭🙏🙏🙏