The Complete Pentesting & Privilege Escalation Course

By Rob Percival's Codestars, Instructor and founder of Codestars

Language: English

This course is for you

Learn about Pentesting & Privilege Escalation techniques in the way of becoming a certified Cyber Security Professional.

Welcome to The Complete Pentesting & Privilege Escalation Course If you want to become a cyber security professional, if you want to deepen your knowledge in ethical hacking topics, if you are preparing yourself for certifications such as OSCP; then you are at the right place! This is an intermediate to advanced course. If you want to make most of it, you should already have a background in cyber security and Python. Throughout the course we will solve number of vulnerable machines on Vulnhub, TryHackMe & HackTheBox along with the other platforms. Especially Privilege Escalation topic will be thoroughly explained during the course, which will provide you the best tools if you are studying to get a certification such as OSCP. Furthermore we will not only focus on Linux machines but Windows machines as well. Training is given by Atil Samancioglu who has more than 200.000 students worldwide on Ethical Hacking & Mobile Application Development topics along with the Codestars serving more than 1 MM students. If you are ready to take your ethical hacking skills to next level you can immediately see the content of the course and enroll today!

Some of the topics that we are going to cover during the course, completely hands-on:

  • Advanced Linux
  • CTF Solutions
  • Linux Privilege Escalation
  • Windows Privilege Escalation
  • Kernel Exploit
  • Suid
  • Sudo
  • Cronjobs
  • Metasploit
  • Potato Attacks
  • Brute Force
  • Meterpreter Shells


This training will be completely hands on experience but without neglecting the theory. We will cover a lot of scenarios when we solve vulnerable machines which you will face a lot during pentests and certification exams. This will be a big step for you to advance your cyber security career. In order to make most of this course you should have taken The Complete Ethical Hacking Course and similar courses before. You should have a working Kali Linux or a counterpart system already, this will not be covered during the course. Due to the licensing issues, in the Windows pentest & privilege escalation sections we will need a Hack The Box membership. If you do not want to pay for that, you can always watch the last two sections by only taking notes, without exercising. However you should take into consideration that by exercising you can learn in a better way.

Warning: This course aims to provide a good training for people who want to be cyber security professionals. You should not break the law in any way with the offensive penetration test techniques and you accept the responsibility by taking this course.

Who this course is for:

- Students who want to be cyber security professionals - Cyber security professionals who wants to get a certification - Cyber security students who wants to deepen their knowledge about pentests and privilege escalation

Course overview - 59

  • Section 1: Introduction and Course Manual

  • Section 2: Bandit

  • Bandit File Find Cat

  • Bandit Strings Grep

  • Bandit Base64

  • Bandit Gzip Bzip Tar

  • Bandit Nmap

  • Bandit Diff Ssh

  • Bandit Suid

  • Bandit Cron

  • Bandit Cron Advanced

  • Bandit NCat Python

  • Bandit Vim More

  • Bandit Git

  • Bandit Shell

  • Section 3: Wakanda

  • Web Service

  • Gathering More Information

  • Python Reverse Shell

  • Sudo Privilege Escalation

  • Secton 4: Mr. Robot

  • Username Brute Force

  • Password Brute Force

  • Hacking Wordpress

  • Changing User

  • Suid Privilege Escalation

  • Section 5: Fristi Leaks

  • Hacking the Server

  • Switching to Admin

  • Cryptology

  • Root

  • Section 6: Linux Privilege Escalation

  • Enumeration

  • Kernel Exploit

  • More Password Enumeration

  • Sudo List

  • Shadow

  • Preload

  • What is Suid?

  • Sulid Privilege Escalation

  • Path

  • Environment Variables

  • Crontab

  • Sudo Vulnerability

  • Section 7: Windows Privilege Escalation

  • HackTheBox VPN

  • First Machine Setup

  • Hacking Windows

  • Windows Command Prompt

  • Exploit Suggester

  • Other Tools

  • Admin

  • Potato Attack

  • Manual Privilege Escalation

  • Section 8: Arctic

  • Admin Dashboard

  • Cold Fusion

  • Schelevator

  • Section 9: Closing

Reviews | 5.0