Home | Back to Courses
Advanced Linux Privilege Escalation with Hack The Box

Partner: Udemy
Affiliate Name:
Area:
Description: New Spring\Summer 2021 Launch!This is a 100% hands on course as you will be using the same tradecraft and techniques Red Teamer's and advanced adversaries use to escalate privileges on Linux servers after they have gained initial access and established a foothold. This course is not "death by PowerPoint", in fact there is not a single Powerpoint slide in the course. This course is aimed for intermediate to advanced users who are hungry to know how to discover and exploit novel escalation paths on popular Linux servers (including some that are patched). Everything is carefully, explained - step-by-step and mapped to MITRE ATT&CKAdditionally, although Metasploit is used in some attacks, we will be using less Metasploit and more manual walk-throughs because I wanted to take the time to carefully explain WHY each method works and detail how common misconfigurations happen in enterprise environments.Where Metasploit is used, everything is carefully explained and deconstructed so you can understand why and how it works. Exploits start easy and escalate in difficulty as you progress through the course.The TechniquesYou will quickly learn and execute the following escalation of privilege techniques across 5 vulnerable machines. New videos are being released weekly.Malicious Python PackageCVE Modify Launch Daemon (NEW! Just added 02/12/2021 6 New Lectures!)The ToolsYou will use ffuf, gobuster, dirsearch, nmap, Bash Scripting, Python Scripting, netcat, pwncat, Burp Suite (advanced features) and more. You will learn how to threat hunt for SQLi attacks and how to exploit Server Side Template Injection (SSTI) attacks and much much more.My dream for youBy the end of this course you should be able to use these techniques in:Your day to day workOSCP preparation</p
Category: IT & Software > Network & Security > Ethical Hacking
Partner ID:
Price: 199.99
Commission:
Source: Impact
Go to Course