About this tutorial:
Video duration: 00:43:56
In this video, I will be demonstrating how to perform privilege escalation on Windows through various tools and techniques. We will take a look at performing local enumeration, using the windows-exploit-suggester, performing token impersonation attacks, and dumping hashes. We will also be exploring the pass the hash attack and how to use NTLM hashes to obtain elevated privileges on the target Windows system.