- Windows 10 & 11 Versions
- Windows Server Versions
- Windows “NT” Versions
- Windows Administrative Binaries
- Environment Variables
- Windows Key Files & Locations
- Registry Run Keys
- Operating System Information
- Process & Service Enumeration
- Windows Account Enumeration
- Network Info & Configuration
- Registry Commands & Important Keys
- Remote System Enumeration
- File Info & Searching
- Tree Filesystem to Searchable File
- Using Volume Shadow Service (VSS)
- sc.exe Remote Execution
- MMC COM Object
- Remote Schtasks Execution
0206 | Domain and User Enumeration
- Domain Enumeration with Net.exe
- Domain Enumeration with DSQuery
- Finding User System in a Windows Domain
- Remote Desktop Protocol (RDP) Configuration
- Misc [Re]Configuration
- Disable Windows Defender
- Windows Event Viewer Manipulation
- Scheduled Task User Persistence
- Run Key User Persistence
- Startup Directories
- at.exe Schedule (WinXP)
- Poisoning Existing scripts
- Schtasks on Boot
- Service Creation
- Windows 10 .DLL Hijack (WPTSEXTENSIONS)
- PowerShell Scripting
- Powershell Basics
- Powershell OneLiners
- Windows Batch Scripting
- Batch Scripts
0211 | Post Exploitation
- Mimikatz Credential Manipulation
- Windows Privilege Escalation Checklist
- File System Redirection