Windows Exploitation Basics

Hacking Windows is often daunting. Grasp the fundamentals of core Windows concepts and Active Directory vulnerabilities.
Windows is the most popular operating system, used by both individuals and within corporate environments. Windows systems are often linked together to create networks, which are used in most enterprises around the world. This module will explore everything from getting started with using Windows, to attacking common flaws that are found in common Windows systems.

0%
Windows Fundamentals 1
In part 1 of the Windows Fundamentals module, we'll start our journey learning about the Windows desktop, the NTFS file system, UAC, the Control Panel, and more..
0%
Windows Fundamentals 2
In part 2 of the Windows Fundamentals module, discover more about System Configuration, UAC Settings, Resource Monitoring, the Windows Registry and more..
0%
Active Directory Basics
This room will introduce the basic concepts and functionality provided by Active Directory.
0%
Metasploit: Introduction
An introduction to the main components of the Metasploit Framework.
0%
Metasploit: Exploitation
Using Metasploit for scanning, vulnerability assessment and exploitation.
0%
Metasploit: Meterpreter
Take a deep dive into Meterpreter, and see how in-memory payloads can be used for post-exploitation.
0%
Blue
Deploy & hack into a Windows machine, leveraging common misconfigurations issues.
What are modules?
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).
