Course Curriculum

Before the Course
(W41M00) Before the course 00:00:00
(W00) Course Instructions 00:00:00
Module 1
(W41M01) Basics of PowerShell (syntax, cmdlets, system help) 00:00:00
(W41M02) Functions and Modules 00:00:00
(W41M03) PowerShell Jobs 00:00:00
(W41M04) Scripting with PowerShell 00:00:00
(W41M05) Creating powershell scripts 00:00:00
(W41M06) Nishang scripts - case study 00:00:00
(W41A01) Exercise 1: PowerShell cmdlets 30, 00:00
(W41A02) Exercise 2: PowerShell jobs 30, 00:00
(W41A03) Exercise 3: Scripting 30, 00:00
Module 2
(W41M10) PowerShell integration of .NET - Part 1 00:00:00
(W41M11) PowerShell integration of .NET - Part 2 00:00:00
(W41M12) PowerShell and WMI 00:00:00
(W41M13) Using Windows API with PowerShell 00:00:00
(W41M14) COM Objects 00:00:00
(W41M15) PowerShell to Windows Registry 00:00:00
(W41M16) WMI Explorer and PowerShell 00:00:00
(W41A04) Exercise 1: Interaction with Registry 30, 00:00
(W41A05) Exercise 2: Windows API 30, 00:00
(W41A06) Exercise 3: COM objects 30, 00:00
Module 3
(W41M20) Information gathering - Part 1 00:00:00
(W41M21) Information gathering - Part 2 00:00:00
(W41M22) Port scanning and reconnaissance 00:00:00
(W41M23) Client-side attacks using PowerShell 00:00:00
(W41M24) Brute-force attacks using PowerShell 00:00:00
(W41M25) DNS Enumeration 00:00:00
(W41M26) Hacking a Windows system using HTA server with Metasploit 00:00:00
(W41M27) 2FA bypass using PowerShell 00:00:00
(W41M28) Installation of Nishang 00:00:00
(W41A07) Exercise 1: Information gathering 30, 00:00
(W41A08) Exercise 2: Brute forcing 30, 00:00
(W41A09) Exercise 3: DNS Enumeration 30, 00:00
(W41A10) Exercise 4: Exploits in Metasploit 30, 00:00
Module 4
(W41M33) Getting around server config 00:00:00
(W41M34) Privilege escalation - system level 00:00:00
(W41M35) Privilege escalation - part 2 00:00:00
(W41M36) PowerUp PowerShell script attacks 00:00:00
(W41M37) Fetching system details and commands 00:00:00
(W41M38) PowerShell webshell access 00:00:00
(W41M39) Passing the hashes 00:00:00
(W41M40) Retrieving NTLM hashes without touching LSASS 00:00:00
(W41M41) Remote command execution with WMI and remoting 00:00:00
(W41M42) Creating a Registry backdoor using Powershell 00:00:00
(W41M43) PowerShell Scripting with WMI explorer 00:00:00
(W41M44) Powershell - where to find additional resources 00:00:00
(W41A11) Exercise 1: Privilege escalation 30, 00:00
(W41A12) Exercise 2: Create a Registry backdoor 30, 00:00
(W41A13) Exercise 3: Pass the hashes 30, 00:00
(W41A14) Exercise 4: PowerShell script 30, 00:00
(W41A15) Exercise 5: DLL hijacking 30, 00:00
(W41Q01) Final Exam 00:40:00
Final exam
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013