By Rob Percival's Codestars, Instructor and founder of Codestars
The Complete Pentesting & Privilege Escalation Course
Course description
Learn about Pentesting & Privilege Escalation techniques in the way of becoming a certified Cyber Security Professional.
Welcome to The Complete Pentesting & Privilege Escalation Course If you want to become a cyber security professional, if you want to deepen your knowledge in ethical hacking topics, if you are preparing yourself for certifications such as OSCP; then you are at the right place! This is an intermediate to advanced course. If you want to make most of it, you should already have a background in cyber security and Python. Throughout the course we will solve number of vulnerable machines on Vulnhub, TryHackMe & HackTheBox along with the other platforms. Especially Privilege Escalation topic will be thoroughly explained during the course, which will provide you the best tools if you are studying to get a certification such as OSCP. Furthermore we will not only focus on Linux machines but Windows machines as well. Training is given by Atil Samancioglu who has more than 200.000 students worldwide on Ethical Hacking & Mobile Application Development topics along with the Codestars serving more than 1 MM students. If you are ready to take your ethical hacking skills to next level you can immediately see the content of the course and enroll today!
Some of the topics that we are going to cover during the course, completely hands-on:
- Advanced Linux
- CTF Solutions
- Linux Privilege Escalation
- Windows Privilege Escalation
- Kernel Exploit
- Suid
- Sudo
- Cronjobs
- Metasploit
- Potato Attacks
- Brute Force
- Meterpreter Shells
Content
This training will be completely hands on experience but without neglecting the theory. We will cover a lot of scenarios when we solve vulnerable machines which you will face a lot during pentests and certification exams. This will be a big step for you to advance your cyber security career. In order to make most of this course you should have taken The Complete Ethical Hacking Course and similar courses before. You should have a working Kali Linux or a counterpart system already, this will not be covered during the course. Due to the licensing issues, in the Windows pentest & privilege escalation sections we will need a Hack The Box membership. If you do not want to pay for that, you can always watch the last two sections by only taking notes, without exercising. However you should take into consideration that by exercising you can learn in a better way.
Warning: This course aims to provide a good training for people who want to be cyber security professionals. You should not break the law in any way with the offensive penetration test techniques and you accept the responsibility by taking this course.
Who this course is for:
- Students who want to be cyber security professionals - Cyber security professionals who wants to get a certification - Cyber security students who wants to deepen their knowledge about pentests and privilege escalation
Related Skills
Course overview - 59
Section 1: Introduction and Course Manual
Section 2: Bandit
Bandit File Find Cat
Bandit Strings Grep
Bandit Base64
Bandit Gzip Bzip Tar
Bandit Nmap
Bandit Diff Ssh
Bandit Suid
Bandit Cron
Bandit Cron Advanced
Bandit NCat Python
Bandit Vim More
Bandit Git
Bandit Shell
Section 3: Wakanda
Web Service
Gathering More Information
Python Reverse Shell
Sudo Privilege Escalation
Secton 4: Mr. Robot
Username Brute Force
Password Brute Force
Hacking Wordpress
Changing User
Suid Privilege Escalation
Section 5: Fristi Leaks
Hacking the Server
Switching to Admin
Cryptology
Root
Section 6: Linux Privilege Escalation
Enumeration
Kernel Exploit
More Password Enumeration
Sudo List
Shadow
Preload
What is Suid?
Sulid Privilege Escalation
Path
Environment Variables
Crontab
Sudo Vulnerability
Section 7: Windows Privilege Escalation
HackTheBox VPN
First Machine Setup
Hacking Windows
Windows Command Prompt
Exploit Suggester
Other Tools
Admin
Potato Attack
Manual Privilege Escalation
Section 8: Arctic
Admin Dashboard
Cold Fusion
Schelevator
Section 9: Closing
Learners who have already enrolled in this course
Meet your instructor
Course by this author
- Rob Percival's CodestarsThe Complete Web Penetration Testing & Bug Bounty Course12h 50m of content$19.99