Windows Red Team Privilege Escalation Techniques - Bypassing UAC & Kernel Exploits

แชร์
ฝัง
  • เผยแพร่เมื่อ 29 ก.ย. 2024
  • In this video, I will be exploring the process of privilege escalation on Windows by leveraging various privilege escalation techniques.
    Privilege Escalation consists of techniques that adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with unprivileged access but require elevated permissions to follow through on their objectives. Common approaches are to take advantage of system weaknesses, misconfigurations, and vulnerabilities.
    Writeup: hackersploit.o...
    //PLATFORMS
    BLOG ►► bit.ly/3qjvSjK
    FORUM ►► bit.ly/39r2kcY
    ACADEMY ►► bit.ly/39CuORr
    //SOCIAL NETWORKS
    TWITTER ►► bit.ly/3sNKXfq
    DISCORD ►► bit.ly/3hkIDsK
    INSTAGRAM ►► bit.ly/3sP1Syh
    LINKEDIN ►► bit.ly/360qwlN
    PATREON ►► bit.ly/365iDLK
    MERCHANDISE ►► bit.ly/3c2jDEn
    //BOOKS
    Privilege Escalation Techniques ►► amzn.to/3ylCl33
    Docker Security Essentials (FREE) ►► bit.ly/3pDcFuA
    //SUPPORT THE CHANNEL
    NordVPN Affiliate Link (73% Off) ►► bit.ly/3DEPbu5
    Get $100 In Free Linode Credit ►► bit.ly/39mrvRM
    Get started with Intigriti: go.intigriti.c...
    //CYBERTALK PODCAST
    Spotify ►► spoti.fi/3lP65jv
    Apple Podcasts ►► apple.co/3GsIPQo
    //WE VALUE YOUR FEEDBACK
    We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
    //THANK YOU!
    Thanks for watching!
    Благодарю за просмотр!
    Kiitos katsomisesta
    Danke fürs Zuschauen!
    感谢您观看
    Merci d'avoir regardé
    Obrigado por assistir
    دیکھنے کے لیے شکریہ
    देखने के लिए धन्यवाद
    Grazie per la visione
    Gracias por ver
    شكرا للمشاهدة
    -----------------------------------------------------------------------------------
    #redteaming #cybersecurity #pentesting

ความคิดเห็น • 41

  • @RealCyberCrime
    @RealCyberCrime ปีที่แล้ว +8

    its almost like windows purposely helps red teamers

  • @mr.e9778
    @mr.e9778 ปีที่แล้ว

    just want to show my appritiation and say thanks man. Bang on vid

  • @abudi45
    @abudi45 ปีที่แล้ว

    Welcome back buddy...✌

  • @majiri98
    @majiri98 ปีที่แล้ว +1

    🔥🔥🔥

  • @xsTaoo
    @xsTaoo ปีที่แล้ว

    I use ngrok to get a target's shell on the internet, how to elevate privileges on the internet, not LAN

  • @orbitxyz7867
    @orbitxyz7867 ปีที่แล้ว

    Greatt

  • @outofhand3189
    @outofhand3189 ปีที่แล้ว +2

    Please make video on web penetration

    • @HackerSploit
      @HackerSploit  ปีที่แล้ว +4

      I will be publishing the last 3 videos remaining in the Red Team Fundamentals series, after which, i will begin uploading the web app pentesting series.

    • @technicalmuzammil2496
      @technicalmuzammil2496 ปีที่แล้ว

      @@HackerSploit Excellent broter,,, I will wait web app penetration

  • @vardhangoud8851
    @vardhangoud8851 ปีที่แล้ว +6

    Mind blowing content bro🔥

  • @adityakasture9814
    @adityakasture9814 ปีที่แล้ว +1

    Brooooooooooooooooo😮

  • @cyphershell
    @cyphershell ปีที่แล้ว +4

    Always top notch content and teaching skills. Keep it up and wish you all the success my man!

    • @HackerSploit
      @HackerSploit  ปีที่แล้ว +1

      Thank you for the feedback and support. Much appreciated

  • @AIPenetraGuard
    @AIPenetraGuard 4 หลายเดือนก่อน

    Metasploit meterpreter works only when ur locally connected ...

  • @jopcorver7616
    @jopcorver7616 ปีที่แล้ว +1

    running BypassUAC just opens up event viewer on my target machine. Any idea what's wrong?

  • @passaronegro349
    @passaronegro349 ปีที่แล้ว +1

    perfect content... will watch later 🇧🇷✨

  • @outofhand3189
    @outofhand3189 ปีที่แล้ว +2

    Great content 👍 really love it

  • @petermureithi3176
    @petermureithi3176 ปีที่แล้ว +1

    nice videos, i like your content and how you teach,i was requesting web security/pen-testing ,bug bounty and network pentest videos

  • @kalihanter2609
    @kalihanter2609 ปีที่แล้ว +1

    🥰🥰🥰🥰🥰🤩🤩🥳🥰🥰🙃🙃🙃🙃

  • @clearlyclearor
    @clearlyclearor ปีที่แล้ว +1

    really changed my life for better bro.

    • @HackerSploit
      @HackerSploit  ปีที่แล้ว

      Thank you that means a lot.

  • @amaradave
    @amaradave ปีที่แล้ว

    I need help in setting up the platform for this training. Is this from vulnhub if yes, how can I install it?

  • @v380riMz
    @v380riMz ปีที่แล้ว

    Thing I don't understand is, all these exploits require elevated privileges. How can someone in the context of low level privileges do the same exploits? Isn't it very easy to hack a system once you get admin privileges? For me it defeats the purpose of hacking as disabling defender and just going all out seems very easy

  • @dayshag5257
    @dayshag5257 ปีที่แล้ว

    i cant login to starkiller, whats the username and password (If there is some)

  • @johannesjoestar
    @johannesjoestar ปีที่แล้ว

    Basically all of this is detected now so not sure about the value of the content but for study the video is done well.

  • @behnamkaregaran4003
    @behnamkaregaran4003 ปีที่แล้ว

    not subtitle video ? wwwhyyyy? greeate .

  • @daljeetbhati8353
    @daljeetbhati8353 ปีที่แล้ว

    Is this part of red teaming series that started from caldera as it's first video

  • @vjxi
    @vjxi ปีที่แล้ว

    I really needed this 👩‍💻🖥️💯💯

  • @latinoheart89
    @latinoheart89 ปีที่แล้ว

    Are all these examples used in your academy?

  • @tommasougolotti4517
    @tommasougolotti4517 ปีที่แล้ว

    Amazing content. Thank you!

  • @chie8388
    @chie8388 ปีที่แล้ว

    Your the best. From INE

  • @korovamilkplus
    @korovamilkplus ปีที่แล้ว

    Unfortunately, the /powershell/privesc/bypassuac module does not work with Starkiller (it is detected, both with obfuscation and without), despite working perfectly with Metasploit.
    Furthermore, regarding Windows Exploit Suggester, for some reason it's not possible to install python-xlrd for python2.
    Thanks Sensei Alexis for your work!

  • @scott8964
    @scott8964 ปีที่แล้ว

    Excellent video loved the content would love to see more

  • @fric7ion820
    @fric7ion820 ปีที่แล้ว

    Our Mentor is back!!!!!!

  • @kmengkomsot1479
    @kmengkomsot1479 ปีที่แล้ว

    thank you so much 😍😍

  • @shoponline8861
    @shoponline8861 ปีที่แล้ว

    Great

  • @techzon4456
    @techzon4456 ปีที่แล้ว +1

    Sir, please make video's on web app penetration

    • @HackerSploit
      @HackerSploit  ปีที่แล้ว +2

      I will be publishing the last 3 videos remaining in the Red Team Fundamentals series, after which, i will begin uploading the web app pentesting series.

    • @techzon4456
      @techzon4456 ปีที่แล้ว

      @@HackerSploit Thank you for your concern sir......