
Train On-Demand
Choose the training you want from 18,000+ videos of instructor-led content. Watch anywhere.
Learn MorePost-exploitation is the final phase of the penetration testing process and consists of the tactics, techniques and procedures that attackers/adversaries undertake after obtaining initial access on a target system. In this course, you will learn about how to perform local enumeration on target systems to identify critical information like the users and groups, credentials and services. You will also learn how to elevate your privileges on Windows and Linux targets, as well as how to maintain access to target systems after compromise. You will also learn how to dump and crack hashes for the purpose of legitimate authentication or lateral movement. Furthermore, you will also learn how to perform internal network discovery and how to pivot to systems you have discovered on the target’s internal network. The objective of this course is to give you in-depth hands-on skills necessary to perform all the tasks that make up the post-exploitation phase of the penetration testing lifecycle. Test
Instructor for this course
Alexis Ahmed
Course Introduction
Introduction To Post-Exploitation
Post-Exploitation Methodology
Enumerating System Information
Enumerating System Information
Enumerating Users & Groups
Enumerating Users & Groups
Enumerating Network Information
Enumerating Network Information
Enumerating Processes & Services
Enumerating Processes & Services
Automating Windows Local Enumeration
Automating Windows Local Enumeration
Enumerating System Information
Enumerating System Information
Enumerating Users & Groups
Enumerating Users & Groups
Enumerating Network Information
Enumerating Network Information
Enumerating Processes & Cron Jobs
Enumerating Processes & Cron Jobs
Automating Linux Local Enumeration
Automating Linux Local Enumeration
Setting Up A Web Server With Python
Setting Up A Web Server With Python
Transferring Files To Windows Targets
Transferring Files To Windows Targets
Transferring Files To Linux Targets
Transferring Files To Linux Targets
Upgrading Non-Interactive Shells
Upgrading Non-Interactive Shells
Identifying Windows Privilege Escalation Vulnerabilities
Windows Privilege Escalation
Windows: PrivescCheck
Linux Privilege Escalation - Weak Permissions
Permissions Matter!
Linux Privilege Escalation - SUDO Privileges
Editing Gone Wrong
Persistence Via Services
Maintaining Access: Persistence Service
Persistence Via RDP
Maintaining Access: RDP
Persistence Via SSH Keys
Maintaining Access I
Persistence Via Cron Jobs
T1168: Local Job Scheduling
Dumping & Cracking NTLM Hashes
Windows: NTLM Hash Cracking
Dumping & Cracking Linux Password Hashes
Password Cracker: Linux
Pivoting
Pivoting
Clearing Your Tracks On Windows
Clearing Your Tracks On Windows
Clearing Your Tracks On Linux
Clearing Your Tracks On Linux
Course Conclusion
Take your technical training into your own hands and stay engaged with our learn-by-doing platform where you can put your skills to the test with hands-on exercises, quizzes, and labs.
Choose the training you want from 18,000+ videos of instructor-led content. Watch anywhere.
Learn MoreINE quizzes, labs, projects, and exercises help reinforce your knowledge.
Learn MoreOrganized training helps guide you through the most relevant subjects for certification prep.
Learn MoreWe add new courses and learning materials to the platform weekly so you're always up-to-date.
Learn MoreIf you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?
Are the training videos downloadable?
I only want to purchase access to one training course, not all of them, is this possible?
Are there any fees or penalties if I want to cancel my subscription?