What You Need to Know Before
You Start

Starts 8 June 2025 16:29

Ends 8 June 2025

00 days
00 hours
00 minutes
00 seconds
course image

Tactical Post Exploitation

Explore tactical post-exploitation techniques with Carlos Perez, covering advanced strategies for penetration testing and security assessment after initial system compromise.
via YouTube

2544 Courses


59 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Conference Talk

Optional upgrade avallable

Overview

Explore tactical post-exploitation techniques with Carlos Perez, covering advanced strategies for penetration testing and security assessment after initial system compromise.

Syllabus

  • Introduction to Post-Exploitation
  • Understanding the Post-Exploitation Phase
    Objectives and Goals of Post-Exploitation
  • Setting Up the Environment
  • Tools and Resources Required
    Lab Configuration and Management
  • Maintaining Access
  • Persistence Techniques and Mechanisms
    Avoiding Detection and Maintaining Stealth
  • Privilege Escalation
  • Identifying and Exploiting Weaknesses in Local Security
    Leveraging Windows and Linux Privilege Escalation Strategies
  • Lateral Movement
  • Network Reconnaissance and Mapping
    Exploiting Trust Relationships
    Credential Harvesting and Reuse
  • Data Exfiltration Techniques
  • Identifying Valuable Targets and Data
    Covert Data Transfer Methods
  • Evasion and Defense Bypass
  • Anti-Forensics Techniques
    Bypassing Modern Defense Mechanisms and Tools
  • Advanced Post-Exploitation Tools
  • In-Depth Analysis of Popular Tools (e.g., Metasploit, Cobalt Strike)
    Custom Scripting and Tool Development
  • Real-World Scenarios and Case Studies
  • Analyzing Past Incidents and Exploitations
    Applying Tactics to Hypothetical Scenarios
  • Ethical and Legal Considerations
  • Adhering to Legal Standards and Ethical Guidelines
    Reporting and Documentation Best Practices
  • Final Project and Assessment
  • Comprehensive Scenario-Based Assessment
    Documentation and Presentation of Findings

Subjects

Conference Talks