8 hours 28 minutes
Hello and congratulations on the successful completion of the privilege escalation phase of these discussions with respect to the miter attack framework. So what should we have learned up to this point? Well, we're going to be quick. We should have looked at access token manipulation described it,
how it's been used and mitigating and detection techniques. Within that,
we looked at elevated execution with prompt again describing what it was within minor, how we've seen it used or some examples or vulnerabilities there mitigation techniques and detection techniques. We reviewed exploitation for privilege escalation, touching on what it was.
Some use cases in areas where that's been taken advantage of.
And then we jumped into mitigation and detection techniques as well. File system permission. Weaknesses touching on all of those core areas that we've previously discussed. Scheduled tasks. Looking at how that's used,
how you can take advantage of scheduled task to run scripts and do things of that nature and then again, mitigation and detection techniques. We looked at pseudo at a high level, again, being specific to Lennox and Matt Os for essentially running as administrator. If Theseus Doers group is taken advantage of
or that violence manipulated that can be used
to do some damage.
We then rounded our discussions out with Web Shell, describing what that was, how systems should be properly segmented and ensuring that if you do have an externally facing server, that it is limited in its privilege sets and its capabilities.
Remember, throughout all of these discussions, we've got some re occurring themes and things that are happening. But it's important that
you realize that you can consume this information in a number of ways, that you can break these modules up these discussions up into individual categories as need be. And so the mitigation techniques that made up telling to other areas are always going to be important across the board,
and they're going to be worth mentioning again and again.
So with that in mind, I want to thank you for your time today, and I look forward to seeing you again soon.
Become an Incident Handler
In this Career Path, you will learn the incident response process, from building an incident ...
Information Security Fundamentals
The foundational networking and security concepts taught in this career path form the backbone of ...