Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Windows Privilege Escalation for OSCP & Beyond!
Introduction
Introduction (4:15)
Lab Setup (5:54)
Privilege Escalation in Windows (3:33)
Spawning Administrator Shells (1:42)
Privilege Escalation Tools (5:50)
Privilege Escalation Techniques
Kernel Exploits (4:10)
Service Exploits (16:07)
Registry Exploits (5:12)
Passwords (11:34)
Scheduled Tasks (2:16)
Insecure GUI Apps (2:04)
Startup Apps (2:29)
Installed Applications (2:36)
Hot Potato (2:26)
Token Impersonation (10:56)
Port Forwarding (4:08)
Privilege Escalation Strategy (3:07)
Extras
getsystem (Named Pipes & Token Duplication) (7:12)
User Privileges (3:03)
Teach online with
Lab Setup
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock