Autoplay
Autocomplete
Dark Mode
Speed
Previous Lesson
Complete and Continue
Windows Privilege Escalation for Beginners
Introduction
Course Introduction (5:39)
Course Discord (Important) (2:45)
Resources and Tips for Success (3:00)
Course Repo
Gaining a Foothold
Introduction (3:27)
Gaining a Foothold (Box 1) (7:45)
Initial Enumeration
System Enumeration (7:19)
User Enumeration (4:02)
Network Enumeration (4:46)
Password Hunting (4:52)
AV Enumeration (5:08)
Exploring Automated Tools
Automated Tool Overview (11:20)
Exploring Automated Tools (11:07)
Escalation Path: Kernel Exploits
Kernel Exploits Overview (3:29)
Escalation with Metasploit (4:31)
Manual Kernel Exploitation (10:09)
Escalation Path: Passwords and Port Forwarding
Overview (1:53)
Gaining a Foothold (Box 2) (8:23)
Escalation via Stored Passwords (18:03)
Escalation Path: Windows Subsystem for Linux
Overview (1:54)
Gaining a Foothold (Box 3) (15:02)
Escalation via WSL (8:45)
Impersonation and Potato Attacks
Token Impersonation Overview (4:06)
Impersonation Privileges Overview (3:27)
Potato Attacks Overview (2:45)
Gaining a Foothold (Box 4) (11:26)
Escalation via Potato Attack (2:38)
Alternate Data Streams (2:08)
Escalation Path: getsystem
getsystem Overview (3:54)
Escalation Path: RunAs
Overview of RunAs (1:44)
Gaining a Foothold (Box 5) (7:53)
Escalation via RunAs (4:33)
Additional Labs
Overview of TryHackMe Labs (5:34)
Escalation Path: Registry
Overview of Autoruns (6:17)
Escalation via Autorun (4:35)
AlwaysInstallElevated Overview and Escalation (7:04)
Overview of regsvc ACL (2:41)
regsvc Escalation (8:09)
Escalation Path: Executable Files
Executable Files Overview (4:25)
Escalation via Executable Files (2:40)
Escalation Path: Startup Applications
Startup Applications Overview (3:13)
Escalation via Startup Applications (3:58)
Escalation Path: DLL Hijacking
Overview and Escalation via DLL Hijacking (9:40)
Escalation Path: Service Permissions (Paths)
Escalation via Binary Paths (6:28)
Escalation via Unquoted Service Paths (6:51)
Challenge Overview (2:36)
Gaining a Foothold (4:47)
Escalation via Unquoted Service Path Metasploit (8:07)
Manual Challenge Walkthrough (8:59)
Escalation Path: CVE-2019-1388
Overview of CVE-2019-1388 (2:38)
Gaining a Foothold (8:41)
Escalation via CVE-2019-1388 (5:35)
Capstone Challenge
Capstone Overview (1:58)
Challenge Walkthrough 1 (15:59)
Challenge Walkthrough 2 (18:27)
Challenge Walkthrough 3 (14:44)
Challenge Walkthrough 4 (27:54)
Challenge Walkthrough 5 (24:37)
Conclusion
Conclusion (2:03)
Escalation via Stored Passwords
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock