YoVDO

Advanced Techniques for Ethical Hacking

Offered By: LinkedIn Learning

Tags

Ethical Hacking Courses Network Security Courses System Security Courses Privilege Escalation Courses Data Exfiltration Courses

Course Description

Overview

Explore the next phase of your career in ethical hacking with advanced techniques to safely enter and operate on more complex networks and systems.

Syllabus

Introduction
  • Taking the next step in your ethical hacking career
  • What you should know
  • Disclaimer
1. Operating Stealthily
  • Being detected
  • Trying stealthy shells
  • Leaving footprints
2. Living off the Land
  • What is living off the land?
  • Using PowerHub
  • Using the PHPSploit shell
3. Advanced Enumeration
  • Stealthy linux enumeration
  • Stealthy Windows enumeration
  • Powering up our escalation
4. Tunneling and Exfiltration
  • Setting up and using an SSH tunnel
  • Exfiltrating data over ICMP
  • Exfiltration via DNS
5. Escalating Privileges
  • Using Baron Samedit to escalate in Linux
  • Escalating through a dirty pipe
  • Escalating through a nightmare
  • Exploiting the Active Domain
Conclusion
  • What's next

Taught by

Malcolm Shore

Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX