In this episode, Kody and Killian go over more advanced methods of exploiting Windows systems, and how to escalate privileges beyond the initial compromised devices. Sign up for our e-mail alerts to stay updated when we go live & register to win free swag: Chapters: 0:00 Countdown 9:57 Intro 12:04 Phishing Email 14:40 Reverse Shell 18:35 Network Enumeration 21:33 Lateral Movement 24:14 Finding Interesting Data 29:08 DNS Tunneling 33:19 Closing Thoughts 41:19 End Screen











