0201 | Windows OS Details
- Windows 10 & 11 Versions
- Windows Server Versions
- Windows “NT” Versions
- Windows Administrative Binaries
- Environment Variables
- Windows Key Files & Locations
- Registry Run Keys
0202 | Windows System Enumeration
- Operating System Information
- Process & Service Enumeration
- Windows Account Enumeration
- Network Info & Configuration
- Registry Commands & Important Keys
- Remote System Enumeration
0203 | Data Mining Windows
- File Info & Searching
- Tree Filesystem to Searchable File
- Using Volume Shadow Service (VSS)
0204 | Remote Execution
- sc.exe Remote Execution
- MMC COM Object
- Remote Schtasks Execution
0205 | Windows Active Directory
0206 | Domain and User Enumeration
- Domain Enumeration with Net.exe
- Domain Enumeration with DSQuery
- Finding User System in a Windows Domain
0207 | Windows [RE]Configuration
- Remote Desktop Protocol (RDP) Configuration
- Misc [Re]Configuration
- Disable Windows Defender
- Windows Event Viewer Manipulation
0208 | User Level Persistence
- Scheduled Task User Persistence
- Run Key User Persistence
- Startup Directories
- at.exe Schedule (WinXP)
- Poisoning Existing scripts
0209 | System Level Persistence
- Schtasks on Boot
- Service Creation
- Windows 10 .DLL Hijack (WPTSEXTENSIONS)
0210 | Windows Scripting
- PowerShell Scripting
- Powershell Basics
- Powershell OneLiners
- Windows Batch Scripting
- Batch Scripts
0211 | Post Exploitation
- Mimikatz Credential Manipulation
- Windows Privilege Escalation Checklist
- File System Redirection