Pluralsight – Post Exploitation with PowerShell

Pluralsight – Post Exploitation with PowerShell
English | Tutorial | Size: 241.77 MB


After gaining access to a server in a red team engagement, your next step is to escalate your privileges and establish persistence. This course will teach you post-exploitation techniques with PowerShell.

INE – Host & Network Penetration Testing: Exploitation

INE – Host & Network Penetration Testing: Exploitation
English | Tutorial | Size: 10.03 GB


Exploitation consists of the tactics, techniques, and procedures that attackers/adversaries utilize to gain an initial foothold on a target system and consequently the target network.

INE – Host & Network Penetration Testing – Exploitation

INE – Host & Network Penetration Testing – Exploitation
English | Tutorial | Size: 10.03 GB


Exploitation consists of the tactics, techniques, and procedures that attackers/adversaries utilize to gain an initial foothold on a target system and consequently the target network.

Window Kernel Exploitation by HackSys

Window Kernel Exploitation by HackSys
English | Tutorial | Size: 1.05GB


We will look into how we can bypass kASLR, kLFH, and do hands-on exploitation using data-only attack, which effectively bypasses SMEP and other exploit mitigations.