Windows Red Team Exploitation Techniques - Luckystrike & PowerShell Empire
HackerSploit via YouTube
-
10
-
- Write review
Google, IBM & Microsoft Certificates — All in One Plan
2,000+ Free Courses with Certificates: Coding, AI, SQL, and More
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore Windows Red Team exploitation techniques for initial access in this comprehensive video tutorial. Learn to create malicious macro documents for phishing using Luckystrike and set up a Command and Control (C2) server with PowerShell Empire and Starkiller. Dive into post-exploitation frameworks supporting various operating systems, with a focus on Windows implementations in PowerShell. Discover feature-rich options to bypass protections and modify for custom evasion. Gain hands-on experience with powerful tools used in penetration testing and understand their educational value. Access additional resources, including links to tools, frameworks, and community platforms to further enhance your cybersecurity knowledge.
Syllabus
Windows Red Team Exploitation Techniques | Luckystrike & PowerShell Empire
Taught by
HackerSploit