Course Curriculum

Before the Course
(W41M00) Before the course 00:00:00
(W00) Course Instructions 00:00:00
Module 1
(W41M01) Basics of PowerShell (syntax, cmdlets, system help) 00:00:00
(W41M02) Functions and Modules 00:00:00
(W41M03) PowerShell Jobs 00:00:00
(W41M04) Scripting with PowerShell 00:00:00
(W41M05) Creating powershell scripts 00:00:00
(W41M06) Nishang scripts - case study 00:00:00
(W41A01) Exercise 1: PowerShell cmdlets 30, 00:00
(W41A02) Exercise 2: PowerShell jobs 30, 00:00
(W41A03) Exercise 3: Scripting 30, 00:00
Module 2
(W41M10) PowerShell integration of .NET - Part 1 00:00:00
(W41M11) PowerShell integration of .NET - Part 2 00:00:00
(W41M12) PowerShell and WMI 00:00:00
(W41M13) Using Windows API with PowerShell 00:00:00
(W41M14) COM Objects 00:00:00
(W41M15) PowerShell to Windows Registry 00:00:00
(W41M16) WMI Explorer and PowerShell 00:00:00
(W41A04) Exercise 1: Interaction with Registry 30, 00:00
(W41A05) Exercise 2: Windows API 30, 00:00
(W41A06) Exercise 3: COM objects 30, 00:00
Module 3
(W41M20) Information gathering - Part 1 00:00:00
(W41M21) Information gathering - Part 2 00:00:00
(W41M22) Port scanning and reconnaissance 00:00:00
(W41M23) Client-side attacks using PowerShell 00:00:00
(W41M24) Brute-force attacks using PowerShell 00:00:00
(W41M25) DNS Enumeration 00:00:00
(W41M26) Hacking a Windows system using HTA server with Metasploit 00:00:00
(W41M27) 2FA bypass using PowerShell 00:00:00
(W41M28) Installation of Nishang 00:00:00
(W41A07) Exercise 1: Information gathering 30, 00:00
(W41A08) Exercise 2: Brute forcing 30, 00:00
(W41A09) Exercise 3: DNS Enumeration 30, 00:00
(W41A10) Exercise 4: Exploits in Metasploit 30, 00:00
Module 4
(W41M33) Getting around server config 00:00:00
(W41M34) Privilege escalation - system level 00:00:00
(W41M35) Privilege escalation - part 2 00:00:00
(W41M36) PowerUp PowerShell script attacks 00:00:00
(W41M37) Fetching system details and commands 00:00:00
(W41M38) PowerShell webshell access 00:00:00
(W41M39) Passing the hashes 00:00:00
(W41M40) Retrieving NTLM hashes without touching LSASS 00:00:00
(W41M41) Remote command execution with WMI and remoting 00:00:00
(W41M42) Creating a Registry backdoor using Powershell 00:00:00
(W41M43) PowerShell Scripting with WMI explorer 00:00:00
(W41M44) Powershell - where to find additional resources 00:00:00
(W41A11) Exercise 1: Privilege escalation 30, 00:00
(W41A12) Exercise 2: Create a Registry backdoor 30, 00:00
(W41A13) Exercise 3: Pass the hashes 30, 00:00
(W41A14) Exercise 4: PowerShell script 30, 00:00
(W41A15) Exercise 5: DLL hijacking 30, 00:00
(W41Q01) Final Exam 00:40:00
Final exam
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.