01. Course Introduction
02. Course Discord (Important)
03. Resources and Tips for Success
04. Introduction
05. Gaining a Foothold (Box 1)
06. System Enumeration
07. User Enumeration
08. Network Enumeration
09. Password Hunting
10. AV Enumeration
11. Automated Tool Overview
12. Exploring Automated Tools
13. Kernel Exploits Overview
14. Escalation with Metasploit
15. Manual Kernel Exploitation
16. Overview
17. Gaining a Foothold (Box 2)
18. Escalation via Stored Passwords
19. Overview
20. Gaining a Foothold (Box 3)
21. Escalation via WSL
22. Token Impersonation Overview
23. Impersonation Privileges Overview
24. Potato Attacks Overview
25. Gaining a Foothold (Box 4)
26. Escalation via Potato Attack
27. Alternate Data Streams
28. getsystem Overview
29. Overview of RunAs
30. Gaining a Foothold (Box 5)
31. Escalation via RunAs
32. Overview of TryHackMe Labs
33. Overview of Autoruns
34. Escalation via Autorun
35. AlwaysInstallElevated Overview and Escalation
36. Overview of regsvc ACL
37. regsvc Escalation
38. Executable Files Overview
39. Escalation via Executable Files
40. Startup Applications Overview
41. Escalation via Startup Applications
42. Overview and Escalation via DLL Hijacking
43. Escalation via Binary Paths
44. Escalation via Unquoted Service Paths
45. Challenge Overview
46. Gaining a Foothold
47. Escalation via Unquoted Service Path Metasploit
48. Manual Challenge Walkthrough
49. Overview of CVE-2019-1388
50. Gaining a Foothold
51. Escalation via CVE-2019-1388
52. Capstone Overview
53. Challenge Walkthrough 1
54. Challenge Walkthrough 2
55. Challenge Walkthrough 3
56. Challenge Walkthrough 4
57. Challenge Walkthrough 5
58. Conclusion