Malware RED TEAM Operator: Privilege Escalation in Windows Course

HackingAssets

Member
Lucifer
Joined
Aug 12, 2022
Messages
163
Hellcoins
♆1,601
Username Style (Gradient Colours)
A course about breaking and bypassing the Windows security model. Escalating privileges with 20 different techniques. From non-admin to SYSTEM.

Contents​

Intro and Setup​

Introduction to Windows Security
Intro Addendum
Course VM Setup
RTO-LPE.ova
RTO-LPE.zip

Credentials​

"Low Hanging Passwords"
"The X Files" - Interesting Files
"Swimming in Hives" - Registry
"A Boss with Creds" - Abusing Credential Manager
"The King is Naked" - Robbing Credential Manager
"A Thief" - Asking User for Creds

Unsecured Objects​

"Boundless Servant" - Unsecured Service [1]
"Lonely Vassal"- Unsecured Service [2]
"Hornets' Nest"- Unsecured Service [3]

Execution Flow Hijacking​

"Folding Papers"- Unsecured File System
"Hi Jack, Show Me THE WAY" - Exploiting PATH
"Closed. No Service" - Missing Service
"Jobless" - Missing Task
"Library Has Fallen" - DLL Hijacking
"You Ain't Corner Me" - UACME

Getting SYSTEM​

"! NeverRemoveDepressed" - AlwaysInstallElevated Hack
"Hi, Sis!" - New Service for SYSTEM
"Nick Has a Leak: Prelude" - Leaked HANDLE [1]
"Nick Has a Leak: Demon" - Leaked HANDLE [2]
"Nick Has a Leak: Sequel" - Leaked HANDLE [3]
"Chip & Dance: Prologue" - Abusing Tokens [1]
"Chip & Dance Show" - Abusing Tokens [2]
"Broken Calumet: Overture" - Exploiting Named Pipes [1]
"Broken Calumet Exposed" - Exploiting Named Pipes [2]

Assignments​

Assignment #1
Assignment #2
Assignment #3

Summary​

Course Closing Information

Watch Online Or Download:-
 
Last edited by a moderator:

LikeOsado

New member
Joined
Feb 12, 2023
Messages
4
Hellcoins
♆33
A course about breaking and bypassing the Windows security model. Escalating privileges with 20 different techniques. From non-admin to SYSTEM.

Contents​

Intro and Setup​

Introduction to Windows Security
Intro Addendum
Course VM Setup
RTO-LPE.ova
RTO-LPE.zip

Credentials​

"Low Hanging Passwords"
"The X Files" - Interesting Files
"Swimming in Hives" - Registry
"A Boss with Creds" - Abusing Credential Manager
"The King is Naked" - Robbing Credential Manager
"A Thief" - Asking User for Creds

Unsecured Objects​

"Boundless Servant" - Unsecured Service [1]
"Lonely Vassal"- Unsecured Service [2]
"Hornets' Nest"- Unsecured Service [3]

Execution Flow Hijacking​

"Folding Papers"- Unsecured File System
"Hi Jack, Show Me THE WAY" - Exploiting PATH
"Closed. No Service" - Missing Service
"Jobless" - Missing Task
"Library Has Fallen" - DLL Hijacking
"You Ain't Corner Me" - UACME

Getting SYSTEM​

"! NeverRemoveDepressed" - AlwaysInstallElevated Hack
"Hi, Sis!" - New Service for SYSTEM
"Nick Has a Leak: Prelude" - Leaked HANDLE [1]
"Nick Has a Leak: Demon" - Leaked HANDLE [2]
"Nick Has a Leak: Sequel" - Leaked HANDLE [3]
"Chip & Dance: Prologue" - Abusing Tokens [1]
"Chip & Dance Show" - Abusing Tokens [2]
"Broken Calumet: Overture" - Exploiting Named Pipes [1]
"Broken Calumet Exposed" - Exploiting Named Pipes [2]

Assignments​

Assignment #1
Assignment #2
Assignment #3

Summary​

Course Closing Information

Watch Online Or Download:-
[Hidden content]
ty
 

jqxw_jvnwg48

New member
Joined
Feb 19, 2023
Messages
4
Hellcoins
♆21
A course about breaking and bypassing the Windows security model. Escalating privileges with 20 different techniques. From non-admin to SYSTEM.

Contents​

Intro and Setup​

Introduction to Windows Security
Intro Addendum
Course VM Setup
RTO-LPE.ova
RTO-LPE.zip

Credentials​

"Low Hanging Passwords"
"The X Files" - Interesting Files
"Swimming in Hives" - Registry
"A Boss with Creds" - Abusing Credential Manager
"The King is Naked" - Robbing Credential Manager
"A Thief" - Asking User for Creds

Unsecured Objects​

"Boundless Servant" - Unsecured Service [1]
"Lonely Vassal"- Unsecured Service [2]
"Hornets' Nest"- Unsecured Service [3]

Execution Flow Hijacking​

"Folding Papers"- Unsecured File System
"Hi Jack, Show Me THE WAY" - Exploiting PATH
"Closed. No Service" - Missing Service
"Jobless" - Missing Task
"Library Has Fallen" - DLL Hijacking
"You Ain't Corner Me" - UACME

Getting SYSTEM​

"! NeverRemoveDepressed" - AlwaysInstallElevated Hack
"Hi, Sis!" - New Service for SYSTEM
"Nick Has a Leak: Prelude" - Leaked HANDLE [1]
"Nick Has a Leak: Demon" - Leaked HANDLE [2]
"Nick Has a Leak: Sequel" - Leaked HANDLE [3]
"Chip & Dance: Prologue" - Abusing Tokens [1]
"Chip & Dance Show" - Abusing Tokens [2]
"Broken Calumet: Overture" - Exploiting Named Pipes [1]
"Broken Calumet Exposed" - Exploiting Named Pipes [2]

Assignments​

Assignment #1
Assignment #2
Assignment #3

Summary​

Course Closing Information

Watch Online Or Download:-
[Hidden content]
Gettng a system!!
 

godcomplex

New member
Joined
Mar 12, 2023
Messages
3
Hellcoins
♆31
A course about breaking and bypassing the Windows security model. Escalating privileges with 20 different techniques. From non-admin to SYSTEM.

Contents​

Intro and Setup​

Introduction to Windows Security
Intro Addendum
Course VM Setup
RTO-LPE.ova
RTO-LPE.zip

Credentials​

"Low Hanging Passwords"
"The X Files" - Interesting Files
"Swimming in Hives" - Registry
"A Boss with Creds" - Abusing Credential Manager
"The King is Naked" - Robbing Credential Manager
"A Thief" - Asking User for Creds

Unsecured Objects​

"Boundless Servant" - Unsecured Service [1]
"Lonely Vassal"- Unsecured Service [2]
"Hornets' Nest"- Unsecured Service [3]

Execution Flow Hijacking​

"Folding Papers"- Unsecured File System
"Hi Jack, Show Me THE WAY" - Exploiting PATH
"Closed. No Service" - Missing Service
"Jobless" - Missing Task
"Library Has Fallen" - DLL Hijacking
"You Ain't Corner Me" - UACME

Getting SYSTEM​

"! NeverRemoveDepressed" - AlwaysInstallElevated Hack
"Hi, Sis!" - New Service for SYSTEM
"Nick Has a Leak: Prelude" - Leaked HANDLE [1]
"Nick Has a Leak: Demon" - Leaked HANDLE [2]
"Nick Has a Leak: Sequel" - Leaked HANDLE [3]
"Chip & Dance: Prologue" - Abusing Tokens [1]
"Chip & Dance Show" - Abusing Tokens [2]
"Broken Calumet: Overture" - Exploiting Named Pipes [1]
"Broken Calumet Exposed" - Exploiting Named Pipes [2]

Assignments​

Assignment #1
Assignment #2
Assignment #3

Summary​

Course Closing Information

Watch Online Or Download:-
[Hidden content]
thanks malware development resources are always usefull
 
Top