Windows Exploitation: 45 Ethical Hacks & Exploits
Published 9/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.84 GB | Duration: 7h 57m
Published 9/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.84 GB | Duration: 7h 57m
“Hands-On Techniques to Elevate Your Pentesting Skills and Master Windows Vulnerabilities”
What you'll learn
Essential Windows Pentesting Techniques
Reconnaissance & Information Gathering
Exploitation & Privilege Escalation
Active Directory Attacks
Post-Exploitation & Persistence
Covering Tracks & Defense Evasion
Real-World Pentesting Scenarios
Requirements
Basic Understanding of Networking – Familiarity with TCP/IP, ports, protocols, and network configurations.
Fundamental Knowledge of Windows Operating Systems
Basic Pentesting Concepts
Familiarity with Security Tools
No Programming Experience Required
Virtual Lab Setup
Description
If you already have a foundation in ethical hacking and want to take your skills to the next level, Windows Exploitation: 45 Ethical Hacks & Exploits is the perfect course for you. Designed for intermediate learners, this course bridges the gap between basic penetration testing concepts and advanced exploitation techniques by focusing specifically on the Windows environment—the most widely targeted operating system in the world.You’ll work through 45 carefully selected hacks and exploits, each demonstrated step-by-step through video lessons and practical labs. From privilege escalation and persistence methods to misconfigurations, remote access attacks, and post-exploitation strategies, you’ll gain real-world skills used by professional penetration testers and red teamers.Each lab is hands-on, guiding you through the process of setting up, attacking, and analyzing vulnerable Windows systems in a safe virtualized environment. Along the way, you’ll learn to leverage powerful tools such as Metasploit, PowerShell, WinPEAS, and MSFVenom, and discover how attackers weaponize Windows weaknesses to gain control of machines.By the end of the course, you will:Confidently exploit Windows vulnerabilities across multiple attack vectors.Use scripts and payloads to establish persistence and escalate privileges.Understand common misconfigurations and how they are abused.Develop a workflow for structured pentesting in Windows domains.Build the skills needed to progress toward advanced red teaming and OSCP-level labs.This course is designed for students who have completed beginner-level ethical hacking or pentesting training and are ready to push beyond reconnaissance and scanning into hands-on exploitation and attack execution.If you’re serious about becoming a skilled penetration tester, security analyst, or red team operator, this intermediate course will give you the tools, knowledge, and experience to stand out in the cybersecurity field.
Overview
Section 1: Course Overview
Lecture 1 Introduction
Section 2: Building Your Lab Envirorment
Lecture 2 Installing Oracle VirtualBox on Windows 10_11
Lecture 3 Installing the VirtualBox Extension Pack
Lecture 4 Creating a Virtaul Install of Kali Linux
Lecture 5 Creating a Virtaul Install of Windows 10
Lecture 6 Creating a Virtual Install of Metasploitable3 (W2k08)
Lecture 7 Creating a Virtual install of Server 2016
Section 3: Reconnaissance & Scanning
Lecture 8 Introduction to Nmap Basics
Lecture 9 Service & OS Detection Using Nmap
Lecture 10 Nmap Service and Open Port scan
Lecture 11 Nmap Host Detection
Lecture 12 Nmap NSE for Windows Services
Lecture 13 Installing OpenVAS Using Docker
Lecture 14 Vulnerability Scanning with OpenVAS
Lecture 15 Using Shodan to Find Exposed Systems
Lecture 16 Creating A Bash Script For Scanning Vulnerable Ports
Section 4: Enumeration & Information Gathering
Lecture 17 Banner Grabbing & Service Fingerprinting
Lecture 18 Local Enumeration with WinPEAS
Lecture 19 Credential Dumping with netsh (Wi-Fi)
Lecture 20 Recon-ng for Windows Infrastructure
Lecture 21 Enumerate DNS Records Using DNSRecon
Section 5: Exploitation
Lecture 22 Use Msfvenom to Create a Reverse TCP Payload
Lecture 23 Use Msfvenom to Create an HTTPS Payload
Lecture 24 Use Msfvenom to Create Hidden Bind TCP Payload
Lecture 25 Use Msfvenom to Create a BIND Shell Payload
Lecture 26 HTML Smuggling Attack
Lecture 27 Exploiting SQL Injection on Windows Sqlmap
Lecture 28 Exploiting the UNIX_Linux rlogin Vulnerability
Lecture 29 Exploiting VSFTPD v2.3.4 Using Metasploit
Lecture 30 Pentesting with Netcat
Section 6: Post-Exploitation & Persistence
Lecture 31 Persistent Backdoor Using Service Persistence
Lecture 32 Remote Access via PowerShell Reverse Shell
Lecture 33 Launch an Automated Meterpreter Session
Lecture 34 Disable UAC on Windows using PowerShell
Section 7: Privilege Escalation on Windows
Lecture 35 Disable UAC on Windows 10 Using Powershell
Lecture 36 Verify Windows Privilege Escalation Unquoted Service Path
Lecture 37 Windows Privilege Escalation - Unquoted Service Path
Section 8: Credential Attacks
Lecture 38 Password Cracking with Hydra
Lecture 39 Password Cracking with Medusa
Lecture 40 Password Cracking with Mimikatz
Lecture 41 Password Cracking with Hydra
Lecture 42 Brute-Forcing Windows Services (RDP/SMB)
Lecture 43 Brute Force the SMB Password
Lecture 44 Advanced Password Hacking Techniques with Metasploit
Section 9: Wireless & Network Attacks
Lecture 45 Quickly Transfer files Using Python's SimpleHTTPServer
Lecture 46 Web Application Firewall Detection Using WAFW00F
Lecture 47 Spoof Fake TCP IP Packets Using Hping3
Lecture 48 Perform a Vulnerability Scan Using OWASP ZAP Attack Proxy
Lecture 49 Exploiting HTTP PUT
Ethical Hackers & Pentesters,Cybersecurity Students,Red Teamers & Security Professionals,IT Administrators & System Engineers,Bug Bounty Hunters,Blue Team Defenders