• Online, Self-Paced
Course Description

In this Challenge Lab, you will earn about the types of post-exploit activities that adversaries may engage in once they have breached the security of a target. First, you will use Metasploit to gain remote access to Windows® under a limited user account, and then you will perform post-exploit privilege escalation. Next, you will perform post-exploit activities by using SYSTEM-level privileges. Finally, you will hide files by using New Technology File System (NTFS) alternate data streams (ADS). Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start.

Learning Objectives

In this Challenge Lab, you will earn about the types of post-exploit activities that adversaries may engage in once they have breached the security of a target. First, you will use Metasploit to gain remote access to Windows® under a limited user account, and then you will perform post-exploit privilege escalation. Next, you will perform post-exploit activities by using SYSTEM-level privileges. Finally, you will hide files by using New Technology File System (NTFS) alternate data streams (ADS). Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cybersecurity Management