Sign in to confirm you’re not a bot
This helps protect our community. Learn more

Introduction

0:00

What We’ll Be Covering

0:43

Mitre Attack Initial Access

1:24

A Note About Phishing

2:42

Our Methodologies

3:17

Let’s get Started

6:06

Setting Up Our Infrastructure (Empire & Starkiller)

6:15

Start the Powershell Empire Server

8:12

Start the Powershell Empire Client

9:18

Initializing Starkiller

9:46

Examining the Starkiller UI

10:48

Enable the csharpserver Plugin

11:00

Installing Luckystrike

12:47

Installing Module Invoke-Obfuscation

15:39

Loading the Module into PowerShell

17:00

How to use Luckystrike

20:14

Generating our Payloads

22:04

Download our Payloads

31:32

Working with Luckystrike

32:06

Executing our Payloads

38:09

Remotely Executing Exploits via Modules

39:46

Brief Chat about Phishing

43:13

Brief Chat about Additional Stagers

44:05

Why We Didn’t Talk About Encoding or Obfuscation

45:57

Conclusion

46:36
Windows Red Team Exploitation Techniques | Red Team Series 3-13
71Likes
4,149Views
2022Mar 21
This guide is part of the ‪@HackerSploit‬ Red Team series of guides. In this video, we will cover Exploitation Techniques for Windows systems. Techniques used to gain a foothold include targeted spear phishing and exploiting weaknesses on public-facing web servers. Footholds gained through initial access may allow for continued access, like valid accounts and use of external remote services, or may be limited use due to changing passwords. Chapters: 0:00 Introduction 0:43 What We’ll Be Covering 1:24 Mitre Attack Initial Access 2:42 A Note About Phishing 3:17 Our Methodologies 6:06 Let’s get Started 6:15 Setting Up Our Infrastructure (Empire & Starkiller) 8:12 Start the Powershell Empire Server 9:18 Start the Powershell Empire Client 9:46 Initializing Starkiller 10:48 Examining the Starkiller UI 11:00 Enable the csharpserver Plugin 12:47 Installing Luckystrike 15:39 Installing Module Invoke-Obfuscation 17:00 Loading the Module into PowerShell 20:14 How to use Luckystrike 22:04 Generating our Payloads 31:32 Download our Payloads 32:06 Working with Luckystrike 38:09 Executing our Payloads 39:46 Remotely Executing Exploits via Modules 43:13 Brief Chat about Phishing 44:05 Brief Chat about Additional Stagers 45:57 Why We Didn’t Talk About Encoding or Obfuscation 46:36 Conclusion New to Cloud Computing? Get started here with a $100 credit → https://www.linode.com/linodetube Read the doc for more information on Recon Techniques → https://www.linode.com/docs/guides/wi... Learn more about Hackersploit https://www.linode.com/docs/guides/ha... Subscribe to get notified of new episodes as they come out → https://www.youtube.com/linode?sub_co... #Linode #Security #RedTeam #Hackersploit Product: Linode, Security, Red Team; Hackersploit;

Follow along using the transcript.

Akamai Developer

1.04M subscribers