Windows Post Exploitation w/ Kyle Avery | Antisyphon

Windows Post Exploitation w/ Kyle Avery | Antisyphon
English | Size: 3.72 GB
Genre: eLearning

Windows Post Exploitation focuses on four major components of any adversary simulation or red team exercise: enumeration, persistence, privilege escalation, and lateral movement. Each of these steps will be covered in detail with hands-on labs in a custom Active Directory environment. Students will learn several modern techniques to operate in a way that minimizes opportunities for detection.

The course goes beyond teaching popular tactics, techniques, and procedures. Students will learn how to covertly gather and leverage information about a target environment to achieve their objectives efficiently.

If any links die or problem unrar, send request to

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.