Home
Categories
EXPLORE
True Crime
Society & Culture
Comedy
History
News
Education
Science
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/72/9c/78/729c78c8-dd4a-83f1-d865-c815a52fcb4a/mza_18143718259370525373.jpg/600x600bb.jpg
CyberCode Academy
CyberCode Academy
108 episodes
1 day ago
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.
Show more...
Courses
Education,
Technology
RSS
All content for CyberCode Academy is the property of CyberCode Academy and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.
Show more...
Courses
Education,
Technology
https://d3wo5wojvuv7l.cloudfront.net/t_rss_itunes_square_1400/images.spreaker.com/original/dba9f3a082f70c03bc083a6d51c2700a.jpg
Course 16 - Red Team Ethical Hacking Beginner Course | Episode 5: Windows Lateral Movement: Manual Execution via WMIC, Scheduled Tasks
CyberCode Academy
9 minutes
4 days ago
Course 16 - Red Team Ethical Hacking Beginner Course | Episode 5: Windows Lateral Movement: Manual Execution via WMIC, Scheduled Tasks
In this lesson, you’ll learn about:
  • The purpose of manual lateral movement in red team operations
  • Why native Windows utilities are critical for stealth and reliability
  • Three core lateral movement methodologies used in authorized engagements
  • Privilege context differences between execution methods
  • How these techniques relate to common automated tools
Overview This lesson delivers a technical deep dive into manual lateral movement within Windows domain environments. Lateral movement refers to the ability to pivot from one compromised system to another after obtaining elevated credentials—most commonly domain administrative access. Rather than relying on automated frameworks, this episode emphasizes manual techniques using native Windows functionality, which are:
  • Less noisy
  • More flexible
  • Harder to detect when used responsibly in controlled testing
All techniques discussed assume explicit authorization, proper scoping, and a professional red team context. 1. Lateral Movement Using WMIC Concept WMIC (Windows Management Instrumentation Command) allows administrators to remotely interact with systems using the Windows Management Infrastructure. Methodology
  • The attacker targets a remote host by explicitly specifying it
  • Remote interaction is used to:
    • Validate access
    • Confirm file placement
    • Trigger execution of an existing payload
Key Characteristics
  • Requires administrative privileges on the target
  • Execution occurs under the credential context of the initiating user
  • Commonly used for:
    • Quick pivots
    • Testing administrative access
    • Lightweight remote execution
Operational Insight This method is simple and effective but does not automatically grant SYSTEM-level access. The resulting execution inherits the privileges of the domain admin account used. 2. Lateral Movement Using Scheduled Tasks Concept Windows Scheduled Tasks provide a powerful mechanism to execute actions on remote systems at defined times or conditions. Methodology
  • A payload is staged on the target system
  • A task is created remotely with:
    • A one-time execution
    • Immediate triggering behavior
    • Execution configured under a high-privilege account
Key Characteristics
  • Can execute under NT AUTHORITY\SYSTEM
  • Allows privilege escalation beyond domain admin
  • The “run once” approach prevents repeated execution
Operational Insight This technique is widely used in red team engagements because it:
  • Mimics legitimate administrative behavior
  • Blends into system management activity
  • Provides strong control over execution timing
3. Lateral Movement Using Service Control Manager (SCM) Concept The Service Control Manager manages Windows services, which inherently run with elevated privileges. Methodology
  • A specially designed service-compatible executable is required
  • The payload is registered as a new service on the target
  • Starting the service triggers execution automatically
Key Characteristics
  • Executes as SYSTEM by default
  • Explains the mechanics behind tools like PsExec
  • Requires careful payload preparation due to service constraints
Operational Insight Because services are tightly integrated with Windows internals, this method is:
  • Extremely powerful
  • Highly privileged
  • More detectable if not carefully...
CyberCode Academy
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.