• Online, Self-Paced
Course Description

In this Challenge Lab, you will earn about the types of post-exploit activities that adversaries may engage in once they have breached the security of a target. First, you will use Metasploit to gain remote access to Windows® under a limited user account, and then you will perform post-exploit privilege escalation. Next, you will perform post-exploit activities by using SYSTEM-level privileges. Finally, you will hide files by using New Technology File System (NTFS) alternate data streams (ADS). Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start.

Learning Objectives

In this Challenge Lab, you will earn about the types of post-exploit activities that adversaries may engage in once they have breached the security of a target. First, you will use Metasploit to gain remote access to Windows® under a limited user account, and then you will perform post-exploit privilege escalation. Next, you will perform post-exploit activities by using SYSTEM-level privileges. Finally, you will hide files by using New Technology File System (NTFS) alternate data streams (ADS). Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.