Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/72/9c/78/729c78c8-dd4a-83f1-d865-c815a52fcb4a/mza_18143718259370525373.jpg/600x600bb.jpg
CyberCode Academy
CyberCode Academy
110 episodes
1 day ago
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.
Show more...
Courses
Education,
Technology
RSS
All content for CyberCode Academy is the property of CyberCode Academy and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.
Show more...
Courses
Education,
Technology
https://d3wo5wojvuv7l.cloudfront.net/t_rss_itunes_square_1400/images.spreaker.com/original/b2719face048d8715309e947f87dc0f9.jpg
Course 16 - Red Team Ethical Hacking Beginner Course | Episode 4: Windows Post-Exploitation: Remote File Management and System Control
CyberCode Academy
14 minutes
1 week ago
Course 16 - Red Team Ethical Hacking Beginner Course | Episode 4: Windows Post-Exploitation: Remote File Management and System Control
In this lesson, you’ll learn about:
  • The role of post-exploitation in red team operations
  • Why redundancy is critical for operational reliability
  • Multiple ethical techniques for file handling, execution, and process control
  • Methods for controlled system impact and disruption
  • The importance of cleanup and reversibility in professional engagements
Overview This lesson provides a technical demonstration of post-exploitation techniques used by red team professionals after initial access has been achieved. The focus is not on gaining access, but on maintaining control, executing actions reliably, and manipulating system behavior in a controlled and reversible manner. A central theme of this episode is redundancy. Professional red teamers must know multiple ways to perform the same task, ensuring mission success even if certain tools, permissions, or frameworks are unavailable. All techniques are presented in an ethical, authorized testing context, aligned with real-world red team operations and the MITRE ATT&CK framework. 1. File Transfer and Management Post-exploitation frequently requires moving tools, logs, or evidence between systems. Automated File Handling
  • Command and Control (C2) frameworks often provide built-in file operations such as:
    • Uploading payloads
    • Downloading collected data
    • Copying files across directories or systems
These features simplify operations but should never be relied on exclusively. Manual File Transfer (Fallback Method)
  • When automated tools are unavailable, red teamers can rely on:
    • Temporary SMB shares hosted on their own system
    • Native Windows file copy functionality
This approach reinforces the principle of tool independence, ensuring operations can continue using built-in system capabilities. 2. Local and Remote Process Termination Managing running processes is essential for:
  • Removing artifacts
  • Releasing locked files
  • Stopping unstable or suspicious processes
  • Cleaning up after execution
Process Identification
  • Enumerating running processes to identify:
    • Process names
    • Associated Process IDs (PIDs)
    • Execution context
Termination Techniques
  • Local process termination using native Windows utilities
  • Remote process termination against authorized targets
  • Alternative approaches using Windows management interfaces
Redundancy ensures that if one method fails, another can be used to achieve the same goal. 3. Execution Methods Execution techniques allow red teamers to:
  • Launch payloads
  • Run administrative actions
  • Establish persistence
  • Test detection and response mechanisms
Service-Based Execution
  • Creating and starting services remotely
  • Services often execute with elevated privileges
  • Commonly used to test privilege escalation and detection logic
Scheduled Task Execution
  • Creating tasks that:
    • Run immediately
    • Execute on startup
    • Trigger at defined intervals
  • Often used for:
    • Persistence testing
    • Delayed execution scenarios
Remote Process Creation
  • Leveraging system management interfaces to:
    • Execute files silently
    • Avoid interactive sessions
    • Test endpoint monitoring visibility
4. System Impact: Shutdown, Reboot, and Logoff This section aligns closely with MITRE...
CyberCode Academy
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.