By Rob Percival's Codestars, Instructor and founder of Codestars

The Complete Pentesting & Privilege Escalation Course

Language: English
All Levels

Course description

Learn about Pentesting & Privilege Escalation techniques in the way of becoming a certified Cyber Security Professional.

Welcome to The Complete Pentesting & Privilege Escalation Course If you want to become a cyber security professional, if you want to deepen your knowledge in ethical hacking topics, if you are preparing yourself for certifications such as OSCP; then you are at the right place! This is an intermediate to advanced course. If you want to make most of it, you should already have a background in cyber security and Python. Throughout the course we will solve number of vulnerable machines on Vulnhub, TryHackMe & HackTheBox along with the other platforms. Especially Privilege Escalation topic will be thoroughly explained during the course, which will provide you the best tools if you are studying to get a certification such as OSCP. Furthermore we will not only focus on Linux machines but Windows machines as well. Training is given by Atil Samancioglu who has more than 200.000 students worldwide on Ethical Hacking & Mobile Application Development topics along with the Codestars serving more than 1 MM students. If you are ready to take your ethical hacking skills to next level you can immediately see the content of the course and enroll today!

Some of the topics that we are going to cover during the course, completely hands-on:

  • Advanced Linux
  • CTF Solutions
  • Linux Privilege Escalation
  • Windows Privilege Escalation
  • Kernel Exploit
  • Suid
  • Sudo
  • Cronjobs
  • Metasploit
  • Potato Attacks
  • Brute Force
  • Meterpreter Shells


This training will be completely hands on experience but without neglecting the theory. We will cover a lot of scenarios when we solve vulnerable machines which you will face a lot during pentests and certification exams. This will be a big step for you to advance your cyber security career. In order to make most of this course you should have taken The Complete Ethical Hacking Course and similar courses before. You should have a working Kali Linux or a counterpart system already, this will not be covered during the course. Due to the licensing issues, in the Windows pentest & privilege escalation sections we will need a Hack The Box membership. If you do not want to pay for that, you can always watch the last two sections by only taking notes, without exercising. However you should take into consideration that by exercising you can learn in a better way.

Warning: This course aims to provide a good training for people who want to be cyber security professionals. You should not break the law in any way with the offensive penetration test techniques and you accept the responsibility by taking this course.

Who this course is for:

- Students who want to be cyber security professionals - Cyber security professionals who wants to get a certification - Cyber security students who wants to deepen their knowledge about pentests and privilege escalation

Related Skills

Course overview - 59

  • Section 1: Introduction and Course Manual

  • Section 2: Bandit

  • Bandit File Find Cat

  • Bandit Strings Grep

  • Bandit Base64

  • Bandit Gzip Bzip Tar

  • Bandit Nmap

  • Bandit Diff Ssh

  • Bandit Suid

  • Bandit Cron

  • Bandit Cron Advanced

  • Bandit NCat Python

  • Bandit Vim More

  • Bandit Git

  • Bandit Shell

  • Section 3: Wakanda

  • Web Service

  • Gathering More Information

  • Python Reverse Shell

  • Sudo Privilege Escalation

  • Secton 4: Mr. Robot

  • Username Brute Force

  • Password Brute Force

  • Hacking Wordpress

  • Changing User

  • Suid Privilege Escalation

  • Section 5: Fristi Leaks

  • Hacking the Server

  • Switching to Admin

  • Cryptology

  • Root

  • Section 6: Linux Privilege Escalation

  • Enumeration

  • Kernel Exploit

  • More Password Enumeration

  • Sudo List

  • Shadow

  • Preload

  • What is Suid?

  • Sulid Privilege Escalation

  • Path

  • Environment Variables

  • Crontab

  • Sudo Vulnerability

  • Section 7: Windows Privilege Escalation

  • HackTheBox VPN

  • First Machine Setup

  • Hacking Windows

  • Windows Command Prompt

  • Exploit Suggester

  • Other Tools

  • Admin

  • Potato Attack

  • Manual Privilege Escalation

  • Section 8: Arctic

  • Admin Dashboard

  • Cold Fusion

  • Schelevator

  • Section 9: Closing

Learners who have already enrolled in this course

Meet your instructor

Rob Percival's Codestars
Rob Percival's CodestarsInstructor and founder of Codestars
Hi! I'm Rob. I have a degree in Mathematics from Cambridge University and you might call me a bit of coding geek. I've taught over a million students how to code, and I created in order to work with other brilliant instructors on technology and programming courses! I'm passionate about teaching kids to code, and I also run the popular web hosting and design service, Eco Web Hosting which leaves me free to share my secrets with people like you. My course co-instructors include the highly respected Atil Samancıoğlu, the brilliant Dr John Baugh, and many (many) more. I hope you enjoy the courses we've created!  Happy coding.