YoVDO

Advanced Techniques for Ethical Hacking

Offered By: LinkedIn Learning

Tags

Ethical Hacking Courses Network Security Courses System Security Courses Privilege Escalation Courses Data Exfiltration Courses

Course Description

Overview

Explore the next phase of your career in ethical hacking with advanced techniques to safely enter and operate on more complex networks and systems.

Syllabus

Introduction
  • Taking the next step in your ethical hacking career
  • What you should know
  • Disclaimer
1. Operating Stealthily
  • Being detected
  • Trying stealthy shells
  • Leaving footprints
2. Living off the Land
  • What is living off the land?
  • Using PowerHub
  • Using the PHPSploit shell
3. Advanced Enumeration
  • Stealthy linux enumeration
  • Stealthy Windows enumeration
  • Powering up our escalation
4. Tunneling and Exfiltration
  • Setting up and using an SSH tunnel
  • Exfiltrating data over ICMP
  • Exfiltration via DNS
5. Escalating Privileges
  • Using Baron Samedit to escalate in Linux
  • Escalating through a dirty pipe
  • Escalating through a nightmare
  • Exploiting the Active Domain
Conclusion
  • What's next

Taught by

Malcolm Shore

Related Courses

CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent
Enterprise Security Fundamentals
Microsoft via edX
Penetration Testing - Post Exploitation
New York University (NYU) via edX
Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy
Hands-on Penetration Testing Labs 4.0
Udemy