Windows Privilege Escalation for Beginners

  Переглядів 79,550

The Cyber Mentor

The Cyber Mentor

День тому

0:00 - Overview
2:25 - Course Introduction
11:52 - Gaining a Foothold
23:15 - Initial Enumeration
49:50 - Exploring Automated Tools
1:12:28 - Kernel Exploits
1:30:32 - Passwords and Port Forwarding
1:59:28 - Windows Subsystem for Linux
2:25:26 - Impersonation Attacks
2:52:29 - getsystem
2:56:28 - RunAs
3:10:53 - Conclusion
Full course here: academy.tcm-sec.com/p/windows...
Pentests & Security Consulting: tcm-sec.com
Get Trained: academy.tcm-sec.com
Get Certified: certifications.tcm-sec.com
Merch: merch.tcm-sec.com
Sponsorship Inquiries: info@thecybermentor.com
📱Social Media📱
___________________________________________
Twitter: / thecybermentor
Twitch: / thecybermentor
Instagram: / thecybermentor
LinkedIn: / heathadams
TikTok: / thecybermentor
Discord: / discord
💸Donate💸
___________________________________________
Like the channel? Please consider supporting me on Patreon:
/ thecybermentor
Support the stream (one-time): streamlabs.com/thecybermentor
Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: amzn.to/31GN7iX
The Hacker Playbook 3: amzn.to/34XkIY2
Hacking: The Art of Exploitation: amzn.to/2VchDyL
The Web Application Hacker's Handbook: amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: amzn.to/2V9srOe
Social Engineering: The Science of Human Hacking: amzn.to/31HAmVx
Linux Basics for Hackers: amzn.to/34WvcXP
Python Crash Course, 2nd Edition: amzn.to/30gINu0
Violent Python: amzn.to/2QoGoJn
Black Hat Python: amzn.to/2V9GpQk
My Build:
lg 32gk850g-b 32" Gaming Monitor:amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: amzn.to/30d1UW1
EVGA 2080TI: amzn.to/30d2lj7
MSI Z390 MotherBoard: amzn.to/30eu5TL
Intel 9700K: amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: amzn.to/2M638Zb
Razer Nommo Chroma Speakers: amzn.to/30bWjiK
Razer BlackWidow Chroma Keyboard: amzn.to/2V7A0or
CORSAIR Pro RBG Gaming Mouse: amzn.to/30hvg4P
Sennheiser RS 175 RF Wireless Headphones: amzn.to/31MOgpu
My Recording Equipment:
Panasonic G85 4K Camera: amzn.to/2Mk9vsf
Logitech C922x Pro Webcam: amzn.to/2LIRxAp
Aston Origin Microphone: amzn.to/2LFtNNE
Rode VideoMicro: amzn.to/309yLKH
Mackie PROFX8V2 Mixer: amzn.to/31HKOMB
Elgato Cam Link 4K: amzn.to/2QlicYx
Elgate Stream Deck: amzn.to/2OlchA5
*We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.

КОМЕНТАРІ: 54
@davenddominick
@davenddominick 8 місяців тому
just such clear explanations! awesome job
@user-xu5bf8uv7g
@user-xu5bf8uv7g Рік тому
yay! long live TCM ! thank you so much for your amazing content
@mr.togrul--9383
@mr.togrul--9383 Рік тому
Thank you so much, this truly is the best educational cybersecurity channel
@dustinhxc
@dustinhxc 8 місяців тому
I own the course but this can play straight through nice and easy thanks man! ❤🎉
@user-ro5vg1eo3m
@user-ro5vg1eo3m 10 місяців тому
Thank you for sharing this!
@chipko
@chipko Рік тому
TCM is AWESOME! Thank you for all that you give the InfoSec community!
@LTT.Official
@LTT.Official Рік тому
Legend for uploading, thanks for this.
@pangyk
@pangyk 10 місяців тому
Thank you. Excellent video!
@EliteBuildingCompany
@EliteBuildingCompany 9 місяців тому
Thanks so much for the courses, and i have to say, taking notes with greenshot, and onedrive, is lifechanging lol.
@911MonkeyKing
@911MonkeyKing 8 місяців тому
Thank you!
@dino43432
@dino43432 7 місяців тому
If you want to learn this is your guy. Buying all access pass well worth the money!!!!
@zyzzuschrist3410
@zyzzuschrist3410 Рік тому
Thanks for sharing this! You’re doing great work
@orbitxyz7867
@orbitxyz7867 Рік тому
Thank you soo much 😮❤❤
@Inspiredminds-666
@Inspiredminds-666 11 місяців тому
Thank you so much bro 🥰😘
@_hackwell
@_hackwell Рік тому
Excellent video. Did loads of boxes on HTB skipping windows ones. This is definitively a skill I have to acquire but I still hate powershell. They had to add 'power' in the name which is suspicious 😂 Anyways I'm going for it
@arshdeeprobin1525
@arshdeeprobin1525 Рік тому
Thank you sir
@Corecarex
@Corecarex Рік тому
Thanks ❤
@christiankusi2974
@christiankusi2974 Рік тому
I love you ❤. This channel is the best and I have gotten course on discount 🎉❤
@kimhap4338
@kimhap4338 Рік тому
much obliged sir, i will contribute by sign up for all access course on your website.
@user-oo4on5lg9m
@user-oo4on5lg9m 25 днів тому
Yes please, the last part you said, AWS
@G0DsLion
@G0DsLion Рік тому
Was waiting 1 year ❤
@aliveli-zq5gt
@aliveli-zq5gt 10 днів тому
You should consider adding subtitles to your trainings. I'm aware that knowing English is necessary for cybersecurity. However, learning in one's native language is much more effective and is the right way to learn. Therefore, I have hesitations about purchasing the trainings solely for this reason. For instance, if there's a point I don't understand on UKposts, I immediately turn on the subtitles, making it easier to understand what I've missed. I'm sure that if you add automatic subtitles in a few more languages, you'll experience a surge in training sales.
@arvidj8918
@arvidj8918 Рік тому
Brother, this is by far the best step-by-step explanation about this subject I have ever seen. The level of abstraction you operate at when explaining methods and commands in this video is insane. Not to little, not too much. Keep it up. Greetings from the IT-teacher from Norway ;)
@MsSpaty
@MsSpaty 2 місяці тому
If this video is well explained ill try the TCM subscription
@ReptilianXHologram
@ReptilianXHologram Рік тому
Make a course in secure/safe C programming for beginners!
@ganeshtompe8776
@ganeshtompe8776 Рік тому
Was waiting for this course 🥹🔥...Thankyou❤️
@avichiii
@avichiii 7 місяців тому
This is the last course, that i have to do. already have been through all of the other courses,.'
@derekberthiaume5367
@derekberthiaume5367 2 місяці тому
So this is the knowledge that gets me from the very easy htb to the medium htb machines?
@sotecluxan4221
@sotecluxan4221 Рік тому
Top.
@chomas001
@chomas001 9 місяців тому
Nice
@Adivasi7777
@Adivasi7777 12 днів тому
Can we do the labs with virtual machines Windows Server installation..
@dino43432
@dino43432 7 місяців тому
On the course you offer I found the auto play button but now the sound turns off is there a way to auto play and auto sound? Please
@itech7354
@itech7354 Рік тому
This video is very informative TCM SECURITY IS AWESOME please make window active DIRECTORY EXPLOITATION full video
@A.C._
@A.C._ Рік тому
The "Passwords and Port Forwarding" box is so fucky lol. Please someone tell me if I'm making sense so I can stop going crazy trying to wrap my mind around it: For the victim machine to give its local SMB connection to the attacker machine (which will technically be on the attacker's local route table), and then logging in as the attacker to complete that process, you then have to log in as the victim user to gain privilege over their machine. Is this technically done....under the attacker's local SMB connection? Even though it's the victim's local SMB connection? Wouldn't it recognize that victim user anyways? I need sleep right now lol. Thanks for messing with my head Heath. Keep up the great work as always
@user-wu8uq6wp8p
@user-wu8uq6wp8p Рік тому
I have done all the boxes of HackTheBox medium and hard both windows and linux not the insane so could i attempt the oscp ?
@dimitrovich702
@dimitrovich702 10 місяців тому
can i get a voucher to access all the courses? idk free alike coz is hard to get too much stuff certified
@LFg-rb7zd
@LFg-rb7zd Рік тому
Obrigadooooooooooooooooooooooooooooooooooooooo
@robotron1236
@robotron1236 3 місяці тому
I use Manjaro with the blackarch repo and windows-exploit-suggester is a simple click in pamac. I can't stand Kali, so I made a script that installs 99% of Kali's tools into Manjaro. It's mostly automated, but I'm slowing making it fully automated when I have time.
@mrityunjayadixit1821
@mrityunjayadixit1821 Рік тому
In the Devel machine do we really need to use metasploit for listening? Cant we use "nc -lvnp 4444" and listen directly then upload and execute on the web server? Wont that work? And if not then why not? Whats the difference?
@G0DsLion
@G0DsLion Рік тому
Yes netcat is useable.
@muhannedbelaid8849
@muhannedbelaid8849 Рік тому
Thank Bro❤. Really like your courses. #we_want_coupon_50% for this and the Linux one 😢
@azharalphatrader
@azharalphatrader Рік тому
which linux is best for learning cyber security ?
@martinjulien1841
@martinjulien1841 11 місяців тому
This question make no sens, start by learning basic, not tools
@azharalphatrader
@azharalphatrader 11 місяців тому
@@martinjulien1841 after doing some research ;the most widely used OS by hackers is Kali Linux. It does make sense for me bcoz there are some excellent features like forensic mode for kali Linux. Of course basic remains the same for everything but the platform which we work everyday using those basics is also important.
@TheCyberWarriorGuy
@TheCyberWarriorGuy Рік тому
Why not add this video to the Full length hacking playlist too ?
@bigaripolaylar8993
@bigaripolaylar8993 Місяць тому
1:12:30
@harze6818
@harze6818 8 місяців тому
my windows exploit suggester dosent work :(
@avichiii
@avichiii 7 місяців тому
probably a problem related to python versions!
@deboi_21..
@deboi_21.. Рік тому
1st
@adityagurav460
@adityagurav460 Рік тому
Hii
@soulstatus1884
@soulstatus1884 6 місяців тому
In your course you will provide a certificate
@user-ro5vg1eo3m
@user-ro5vg1eo3m 10 місяців тому
Sadly the Devel Machine is already retired and offline man..
@Haroon_abbasi
@Haroon_abbasi Рік тому
OwO
Hacking Active Directory for Beginners (over 5 hours of content!)
5:16:30
The Cyber Mentor
Переглядів 136 тис.
Windows Pentest Tutorial (Active Directory Game Over!)
1:49:45
David Bombal
Переглядів 229 тис.
What Everyone Missed About The Linux Hack
20:24
Theo - t3․gg
Переглядів 268 тис.
Hacking Linux // Linux Privilege escalation // Featuring HackerSploit
1:07:08
How Can Fuzzing Help You Find Hidden API Endpoints?
9:18
Medusa
Переглядів 3,7 тис.
Metasploit
34:20
David Bombal
Переглядів 390 тис.
you need this FREE CyberSecurity tool
32:06
NetworkChuck
Переглядів 1,1 млн
The O.J. Simpson Chase
19:02
neo
Переглядів 92 тис.
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Переглядів 247 тис.
Beloved YouTubers Who Died As Legends
13:57
SunnyV2
Переглядів 1,1 млн
Detect Hackers & Malware on your Computer (literally for free)
16:38
John Hammond
Переглядів 282 тис.
Самый глупый смартфон в мире #LightPhone
0:36
Samsung UE40D5520RU перезагружается, замена nand памяти
0:46
Слава 100пудово!
Переглядів 2,4 млн
Крутое обновление microReader!
5:54
Заметки Ардуинщика
Переглядів 31 тис.