0:00 - Overview 2:25 - Course Introduction 11:52 - Gaining a Foothold 23:15 - Initial Enumeration 49:50 - Exploring Automated Tools 1:12:28 - Kernel Exploits 1:30:32 - Passwords and Port Forwarding 1:59:28 - Windows Subsystem for Linux 2:25:26 - Impersonation Attacks 2:52:29 - getsystem 2:56:28 - RunAs 3:10:53 - Conclusion Full course here: Pentests & Security Consulting: Get Trained: Get Certified: Merch: Sponsorship Inquiries: info@ 📱Social Media📱 ___________________________________________ Twitter: Twitch: Instagram: LinkedIn: TikTok: @thecyber
Hide player controls
Hide resume playing