What about this course?
Exploitation and post-exploitation are an important part of the penetration testing lifecycle and will ultimately define the overall success of a penetration test. This course is designed for beginners and intermediates that have some experience in pentesting and are looking to improve their exploitation and post-exploitation skills. This Bootcamp will start off by exploring various initial access tactics and techniques used by penetration testers to gain access to both Windows and Linux targets. You will then learn how to perform various post-exploitation techniques like local enumeration, privilege escalation, persistence, and hash dumping on Windows & Linux targets. Lastly, you will also learn how to perform internal reconnaissance on a target network in order to pivot from one system to another and move laterally through a target network.

Instructor for this course
Alexis Ahmed
This course is composed by the following modules
Course Introduction
Introduction To The MITRE ATT&CK Framework
Initial Access
Exploiting Public-Facing Applications - T1190
RCE Via MySQL
RCE via MySQL
jQuery File Upload Vulnerability
Vulnerable File Upload Widget
Exploiting External Remote Services - T1133
Exploiting SMB With PsExec
Windows: SMB Server PSexec II
Exploiting WinRM
WinRM: Exploitation with Metasploit
Initial Access Via Spearphishing - T1566.002 - Part 1
Initial Access Via Spearphishing - T1566.002 - Part 2
Let's Go Phishing
Introduction To Post-Exploitation
Post-Exploitation Methodology
Local Enumeration On Windows
Automating Windows Local Enumeration
Windows Privilege Escalation
Windows Unattended Installs
Unattended Installation
Bypassing UAC With UACMe
UAC Bypass: UACMe
Windows Access Token Impersonation
Privilege Escalation: Impersonate
Persistence Via Scheduled Tasks
OS Credential Dumping
Local Enumeration On Linux - Part 1
Local Enumeration On Linux - Part 2
Linux Privilege Escalation
Exploiting Misconfigured SUID Binaries
Exploiting Misconfigured SUDO Privileges
Exploitation for Privilege Escalation
Linux Persistence
Persistence Via Cron Job
Persistence Via Web Shells
Pivoting/Lateral Movement
Pivoting With MSF
Pivoting With reGeorg
Course Conclusion
Common Course Questions
If you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?
Are the training videos downloadable?
I only want to purchase access to one training course, not all of them, is this possible?
Are there any fees or penalties if I want to cancel my subscription?