Getting Started with PowerSploit

For years, the tools contained within PowerSploit have provided attackers and defenders with the capability to easily exploit misconfigured AD environments. Learn how to use PowerSploit to compromise systems, gather data, and escalate privileges.
Course info
Level
Beginner
Updated
Nov 12, 2019
Duration
2h 23m
Table of contents
Course Overview
Analyzing PowerSploit Attack Capabilities
Using PowerSploit to Perform Code Execution Attack
Leveraging PowerSploit to Gain Elevated Privileges on Workstations and Servers
Performing System and Domain Reconnaissance
Using PowerSploit to Compress, Compile, Encrypt, and Modify Files
Using PowerSploit to Maintain Access on Compromised Systems
Gathering Interesting and Useful Data from Compromised Systems
Having Fun with PowerSploit
Description
Course info
Level
Beginner
Updated
Nov 12, 2019
Duration
2h 23m
Description

PowerSploit provides tools that assist defenders and attackers in identifying and exploiting vulnerabilities in Windows based networks and systems. In this course, Getting Started with PowerSploit, you will learn foundational knowledge to use the tools provided within the PowerSploit Post Exploitation Framework. First, you will learn how to leverage the tools within the code execution module. Next, you will discover how you can use PowerSploit to identify escalation opportunities. Finally, you will explore how to perform enumeration activities. When you're finished with this course, you will have the skills and knowledge of PowerSploit needed to incorporate PowerSploit into your testing activities.

About the author
About the author

Lee Allen is a penetration tester by trade. Lee has authored four books about penetration testing and has created several Pluralsight courses.

More from the author
Credential Access with THC Hydra
Intermediate
27m
Aug 19, 2020
Credential Access with Mimikatz
Intermediate
25m
Aug 14, 2020
More courses by Lee Allen
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
(Music) Hi everyone! My name is Lee Allen, and welcome to my course, Getting Started with PowerSploit. For years, the tools contained within the PowerSploit post exploitation framework have provided attackers and defenders with the capabilities to easily exploit misconfigured environments. In this course, you're going to be presented with how you can leverage the easy-to-learn tools that PowerSploit provides so that you can understand why they exist and how they're used. Some of the major topics that we're going to cover in this course include using PowerSploit to perform code execution attacks, and then maintaining access on the systems that you've compromised. We're also going to take a look at leveraging PowerSploit to gain elevated privileges on workstations and servers, and gathering interesting and useful data from your targets. By the end of this course, you're going to have a good understanding of how the various tools contained within the PowerSploit post exploitation framework can be leveraged to test the security of your environments. I hope that you'll join me on this journey to learn PowerSploit with the Getting Started with PowerSploit course at Pluralsight.