Windows Exploitation

Master Windows exploitation techniques for red teams and penetration testers. Learn privilege escalation via DLL hijacking, service misconfigurations, and token impersonation. Covers UAC bypasses, COM/DCOM abuse, and kernel exploits (e.g., PrintNightmare). Includes modern toolkits (PowerSploit, SharpUp) and detection evasion tactics for EDR/AV solutions. Essential for: OSCP/PEN-300 prep, enterprise red teaming, and understanding Windows security vulnerabilities from attacker/defender perspectives.