Course Introduction
  • Course Introduction
  • Course Overview
  • Course Prerequisites
  • Minimum Hardware/Software Requirements
  • Ethics Disclaimer
Intro to Empire & Building a Hacking Lab
  • Module 1 Introduction
  • Module 1 Roadmap
  • The Penetration Testing Landscape
  • Enter PowerShell Empire!
  • Mandiant Attack Lifecycle
  • Building a Hacking Lab
  • Lab Walkthrough: Building a Hacking Lab
  • Disabling Anti-Virus and Firewalls
  • Before You Move On...
  • Module 1 Summary
Empire Quick Start
  • Module 2 Introduction: Empire Quick Start
  • Module 2 Roadmap
  • Lab 2.1 - Installing Empire
  • Empire Terminology
  • Empire C2 Diagram
  • How Empire C2 Works
  • Lab 2.2 - Empire Quick Start
  • Lab 2.2 - Configuring an HTTP Listener
  • Lab 2.2 - Deploy an Empire Stager
  • Lab 2.2 - Execute Shell Commands and Modules
  • Lab 2.2 - Housekeeping: Killing Agents
  • Before You Move On...
  • Module 2 Summary
The Initial Compromise
  • Module 3: The Initial Compromise
  • Module 3 Roadmap
  • Overview: The Initial Compromise
  • Physical Access Attacks
  • Physical Access Flowchart
  • Lab 3.1 - Physical Access Attacks
  • Weaponizing Microsoft Office Documents
  • Lab 3.2 - Weaponizing Office Documents
  • Evil HTML Applications
  • Lab 3.3 - Evil HTML Applications
  • Removable Media Drop
  • Lab 3.4 - Removable Media Drop
  • Before You Move On...
  • Module Summary
Gaining a Foothold
  • Module 4 Introduction
  • Module 4 Roadmap
  • Overview: Gaining a Foothold
  • Userland Persistence
  • Lab 4.1 - Userland Persistence - Registry
  • Lab 4.2 - Userland Persistence - Schtasks
  • Situational Awareness
  • Lab 4.3 - Enumerating AntiVirus
  • Lab 4.4 - Local System Enumeration
  • Before You Move On...
  • Module 4 Summary
Escalating Privileges
  • Module 5 Introduction
  • Module 5 Roadmap
  • Overview: Escalating Privileges
  • Lab 5.1 - Identifying Privilege Escalation Vulnerabilities
  • User Account Control
  • Lab 5.2 - Bypass UAC
  • Lab 5.3 - Get System
  • Lab 5.4 - UAC Ask
  • Lab 5.5 - Elevated Persistence
  • Before You Move On...
  • Module 5 Summary
Lateral Movement and Collection Techniques
  • Module 6 Introduction: Lateral Movement and Collection Techniques
  • Module 6 Roadmap
  • Overview: Collection and Lateral Movement
  • Lab 6.1 - Dumping Credentials with Mimikatz
  • Lab 6.2 - Lateral Movement with WMI
  • Other Lateral Movement Techniques
  • Lab 6.3 - Collecting Screenshots
  • Lab 6.4 - Keylogging
  • Lab 6.5 - Clipboard Theft
  • Before You Move On...
  • Module Summary
  • Course Conclusion