Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Mimikatz
YouTube
education
Showing:
14
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Windows Server and Active Directory Penetration Testing
0
rewiews
Learn comprehensive Active Directory penetration testing techniques for Windows Server, covering privilege escalation, persistence, and advanced exploits using various tools and methodologies.
Add to list
28
Lesons
20 hours
On-Demand
Free-Video
Linode
Windows Defense Evasion - Lateral Movement Techniques - Red Team Series
0
rewiews
Explore Windows defense evasion and lateral movement techniques, including privilege elevation, hashdump, mimikatz, and PsExec. Learn to obtain passwords and access systems via RDP and password hashes.
Add to list
12
Lesons
25 minutes
On-Demand
Free-Video
Linode
Windows Red Team Credential Access Techniques - Red Team Series
0
rewiews
Explore advanced credential access techniques for Windows red teaming, including mimikatz usage, password dumping, and token impersonation. Gain practical skills in exploiting vulnerabilities and enhancing your cybersecurity expertise.
Add to list
31
Lesons
41 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Attractive Directory and Deceptive Attacks in Organizational Environments
0
rewiews
Exploración de ataques maliciosos en organizaciones: Pass-The-Hash, Mimikatz y DCSync. Análisis de configuraciones erróneas, propuestas de mitigación y reflexión sobre ciberseguridad en Argentina.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
HackerSploit
Windows Red Team Credential Access Techniques - Mimikatz & WCE
0
rewiews
Explore Windows credential access techniques using Mimikatz and WCE to dump passwords and hashes from memory. Learn post-exploitation methods for red team operations and penetration testing.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
WEareTROOPERS
You Try to Detect Mimikatz
0
rewiews
Explore techniques for detecting Mimikatz, a powerful post-exploitation tool, to enhance cybersecurity defenses and protect against credential theft attacks.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
Hack in Paris
You Try to Detect Mimikatz
0
rewiews
Explore mimikatz's capabilities beyond credential collection, understand its power, and learn detection strategies for this persistent post-exploitation tool.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Hack in Paris
Social Forensication: A Multidisciplinary Approach to Successful Social Engineering - J.Gray - Hack in Paris - 2019
0
rewiews
Explore innovative social engineering techniques, including memory image analysis and rogue Wi-Fi attacks, along with defensive strategies and ethical considerations for cybersecurity professionals.
Add to list
32
Lesons
43 minutes
On-Demand
Free-Video
Windows Operating System Archaeology - Casey Smith and Matt Nelson
0
rewiews
Explore Windows OS archaeology, focusing on Component Object Model, persistence techniques, and evasion methods for enhanced system understanding and security awareness.
Add to list
26
Lesons
51 minutes
On-Demand
Free-Video
Passing the Torch - Old School Red Teaming - New School Tactics
0
rewiews
Explore red teaming tactics, from traditional user hunting to modern PowerShell techniques, covering domain trusts, escalation, pivoting, and persistence in Windows environments.
Add to list
36
Lesons
48 minutes
On-Demand
Free-Video
Black Hat
Red Vs. Blue - Modern Active Directory Attacks, Detection, And Protection
0
rewiews
Explore advanced Active Directory attack methods, detection techniques for Golden and Silver Tickets, and effective mitigation strategies. Learn to identify and protect against sophisticated network intrusions.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Black Hat
So I Became a Domain Controller
0
rewiews
Explore Active Directory replication vulnerabilities, focusing on SAMBA implementation and mimikatz's DCSync feature. Learn techniques for extracting secrets and impersonating domain controllers.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Attackers Perspective - A Technical Demonstration of an Email Phishing Attack
0
rewiews
Explore email phishing attacks from an attacker's perspective, covering reconnaissance, tools, payload delivery, and network enumeration techniques for improved cybersecurity awareness.
Add to list
16
Lesons
44 minutes
On-Demand
Free-Video
Security Instrumentation - Be the Hero Getting Value from Security
0
rewiews
Explore security instrumentation techniques to enhance organizational defenses, measure effectiveness, and demonstrate value in cybersecurity investments.
Add to list
19
Lesons
56 minutes
On-Demand
Free-Video
load more...