Advanced Techniques for Ethical Hacking
Offered By: LinkedIn Learning
Course Description
Overview
Explore the next phase of your career in ethical hacking with advanced techniques to safely enter and operate on more complex networks and systems.
Syllabus
Introduction
- Taking the next step in your ethical hacking career
- What you should know
- Disclaimer
- Being detected
- Trying stealthy shells
- Leaving footprints
- What is living off the land?
- Using PowerHub
- Using the PHPSploit shell
- Stealthy linux enumeration
- Stealthy Windows enumeration
- Powering up our escalation
- Setting up and using an SSH tunnel
- Exfiltrating data over ICMP
- Exfiltration via DNS
- Using Baron Samedit to escalate in Linux
- Escalating through a dirty pipe
- Escalating through a nightmare
- Exploiting the Active Domain
- What's next
Taught by
Malcolm Shore
Related Courses
CNIT 127: Exploit DevelopmentCNIT - City College of San Francisco via Independent Enterprise Security Fundamentals
Microsoft via edX Penetration Testing - Post Exploitation
New York University (NYU) via edX Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy Hands-on Penetration Testing Labs 4.0
Udemy