Windows Privilege Escalation for Beginners
HTML-код
- Опубликовано: 14 июн 2024
- 0:00 - Overview
2:25 - Course Introduction
11:52 - Gaining a Foothold
23:15 - Initial Enumeration
49:50 - Exploring Automated Tools
1:12:28 - Kernel Exploits
1:30:32 - Passwords and Port Forwarding
1:59:28 - Windows Subsystem for Linux
2:25:26 - Impersonation Attacks
2:52:29 - getsystem
2:56:28 - RunAs
3:10:53 - Conclusion
Full course here: academy.tcm-sec.com/p/windows...
Pentests & Security Consulting: tcm-sec.com
Get Trained: academy.tcm-sec.com
Get Certified: certifications.tcm-sec.com
Merch: merch.tcm-sec.com
Sponsorship Inquiries: info@thecybermentor.com
📱Social Media📱
___________________________________________
Twitter: / thecybermentor
Twitch: / thecybermentor
Instagram: / thecybermentor
LinkedIn: / heathadams
TikTok: / thecybermentor
Discord: / discord
💸Donate💸
___________________________________________
Like the channel? Please consider supporting me on Patreon:
/ thecybermentor
Support the stream (one-time): streamlabs.com/thecybermentor
Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: amzn.to/31GN7iX
The Hacker Playbook 3: amzn.to/34XkIY2
Hacking: The Art of Exploitation: amzn.to/2VchDyL
The Web Application Hacker's Handbook: amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: amzn.to/2V9srOe
Social Engineering: The Science of Human Hacking: amzn.to/31HAmVx
Linux Basics for Hackers: amzn.to/34WvcXP
Python Crash Course, 2nd Edition: amzn.to/30gINu0
Violent Python: amzn.to/2QoGoJn
Black Hat Python: amzn.to/2V9GpQk
My Build:
lg 32gk850g-b 32" Gaming Monitor:amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: amzn.to/30d1UW1
EVGA 2080TI: amzn.to/30d2lj7
MSI Z390 MotherBoard: amzn.to/30eu5TL
Intel 9700K: amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: amzn.to/2M638Zb
Razer Nommo Chroma Speakers: amzn.to/30bWjiK
Razer BlackWidow Chroma Keyboard: amzn.to/2V7A0or
CORSAIR Pro RBG Gaming Mouse: amzn.to/30hvg4P
Sennheiser RS 175 RF Wireless Headphones: amzn.to/31MOgpu
My Recording Equipment:
Panasonic G85 4K Camera: amzn.to/2Mk9vsf
Logitech C922x Pro Webcam: amzn.to/2LIRxAp
Aston Origin Microphone: amzn.to/2LFtNNE
Rode VideoMicro: amzn.to/309yLKH
Mackie PROFX8V2 Mixer: amzn.to/31HKOMB
Elgato Cam Link 4K: amzn.to/2QlicYx
Elgate Stream Deck: amzn.to/2OlchA5
*We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites. - Наука
just such clear explanations! awesome job
yay! long live TCM ! thank you so much for your amazing content
TCM is AWESOME! Thank you for all that you give the InfoSec community!
Was waiting for this course 🥹🔥...Thankyou❤️
Thank you so much, this truly is the best educational cybersecurity channel
You should consider adding subtitles to your trainings. I'm aware that knowing English is necessary for cybersecurity. However, learning in one's native language is much more effective and is the right way to learn. Therefore, I have hesitations about purchasing the trainings solely for this reason. For instance, if there's a point I don't understand on RUclips, I immediately turn on the subtitles, making it easier to understand what I've missed. I'm sure that if you add automatic subtitles in a few more languages, you'll experience a surge in training sales.
I own the course but this can play straight through nice and easy thanks man! ❤🎉
Legend for uploading, thanks for this.
Thank you. Excellent video!
Brother, this is by far the best step-by-step explanation about this subject I have ever seen. The level of abstraction you operate at when explaining methods and commands in this video is insane. Not to little, not too much. Keep it up. Greetings from the IT-teacher from Norway ;)
Thank you for sharing this!
Thanks for sharing this! You’re doing great work
I love you ❤. This channel is the best and I have gotten course on discount 🎉❤
If you want to learn this is your guy. Buying all access pass well worth the money!!!!
Thank you soo much 😮❤❤
Thank you!
Thank you so much bro 🥰😘
Excellent video. Did loads of boxes on HTB skipping windows ones. This is definitively a skill I have to acquire but I still hate powershell. They had to add 'power' in the name which is suspicious 😂 Anyways I'm going for it
Thank you sir
much obliged sir, i will contribute by sign up for all access course on your website.
Yes please, the last part you said, AWS
Thanks ❤
Was waiting 1 year ❤
If this video is well explained ill try the TCM subscription
Make a course in secure/safe C programming for beginners!
So this is the knowledge that gets me from the very easy htb to the medium htb machines?
Can we do the labs with virtual machines Windows Server installation..
This is the last course, that i have to do. already have been through all of the other courses,.'
Nice
Top.
would you kindly provide the resources notes that was there in the course videos description on your site? it is not here.
The "Passwords and Port Forwarding" box is so fucky lol. Please someone tell me if I'm making sense so I can stop going crazy trying to wrap my mind around it:
For the victim machine to give its local SMB connection to the attacker machine (which will technically be on the attacker's local route table), and then logging in as the attacker to complete that process, you then have to log in as the victim user to gain privilege over their machine. Is this technically done....under the attacker's local SMB connection? Even though it's the victim's local SMB connection? Wouldn't it recognize that victim user anyways?
I need sleep right now lol. Thanks for messing with my head Heath. Keep up the great work as always
This video is very informative TCM SECURITY IS AWESOME please make window active DIRECTORY EXPLOITATION full video
On the course you offer I found the auto play button but now the sound turns off is there a way to auto play and auto sound? Please
I have done all the boxes of HackTheBox medium and hard both windows and linux not the insane so could i attempt the oscp ?
can i get a voucher to access all the courses? idk free alike coz is hard to get too much stuff certified
In the Devel machine do we really need to use metasploit for listening? Cant we use "nc -lvnp 4444" and listen directly then upload and execute on the web server? Wont that work? And if not then why not? Whats the difference?
Yes netcat is useable.
Obrigadooooooooooooooooooooooooooooooooooooooo
I use Manjaro with the blackarch repo and windows-exploit-suggester is a simple click in pamac. I can't stand Kali, so I made a script that installs 99% of Kali's tools into Manjaro. It's mostly automated, but I'm slowing making it fully automated when I have time.
which linux is best for learning cyber security ?
@Martin Julien after doing some research ;the most widely used OS by hackers is Kali Linux. It does make sense for me bcoz there are some excellent features like forensic mode for kali Linux. Of course basic remains the same for everything but the platform which we work everyday using those basics is also important.
Thank Bro❤. Really like your courses.
#we_want_coupon_50% for this and the Linux one 😢
Why not add this video to the Full length hacking playlist too ?
1:12:30
my windows exploit suggester dosent work :(
probably a problem related to python versions!
Hii
In your course you will provide a certificate
1st
Sadly the Devel Machine is already retired and offline man..
OwO