Completed
Enable the csharpserver Plugin
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Windows Red Team Exploitation Techniques | Red Team Series 3-13
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 What We’ll Be Covering
- 3 Mitre Attack Initial Access
- 4 A Note About Phishing
- 5 Our Methodologies
- 6 Let’s get Started
- 7 Setting Up Our Infrastructure Empire & Starkiller
- 8 Start the Powershell Empire Server
- 9 Start the Powershell Empire Client
- 10 Initializing Starkiller
- 11 Examining the Starkiller UI
- 12 Enable the csharpserver Plugin
- 13 Installing Luckystrike
- 14 Installing Module Invoke-Obfuscation
- 15 Loading the Module into PowerShell
- 16 How to use Luckystrike
- 17 Generating our Payloads
- 18 Download our Payloads
- 19 Working with Luckystrike
- 20 Executing our Payloads
- 21 Remotely Executing Exploits via Modules
- 22 Brief Chat about Phishing
- 23 Brief Chat about Additional Stagers
- 24 Why We Didn’t Talk About Encoding or Obfuscation
- 25 Conclusion