PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links:







Partners
warezload

movieblogarea download
katzdownload

Advanced Linux Privilege Escalation With Hack The Box

Author: DrZero
Date added: 12.08.2023 :24:07
Views: 19
Comments: 0










filespayout.com
Description material

Advanced Linux Privilege Escalation With Hack The Box

Last updated 11/2022
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 6.13 GB | Duration: 5h 10m


How to find and exploit modern Linux Privilege Escalation vulnerabilities without relying on Metasploit.


What you'll learn
How to use multiple methods to escalate privileges on popular Linux Distros
How to succeed in CTF style exams such as the OSCP, eCPPT and CEH
How to escalate privileges in CTFs such as HackTheBox, TryHackMe and more
How to level up your ethical hacking, penetration testing and red teaming skills to earn more money in your career
How to map modern attacks against the MITRE ATT&CK framework!

Requirements
A HackTheBox VIP Subscription is Required
Basic knowledge of virtual machines

Description
New Spring\Summer 2021 Launch!This is a 100% hands on course as you will be using the same tradecraft and techniques Red Teamer's and advanced adversaries use to escalate privileges on Linux servers after they have gained initial access and established a foothold. This course is not "death by PowerPoint", in fact there is not a single Powerpoint slide in the course. This course is aimed for intermediate to advanced users who are hungry to know how to discover and exploit novel escalation paths on popular Linux servers (including some that are patched). Everything is carefully, explained - step-by-step and mapped to MITRE ATT&CKAdditionally, although Metasploit is used in some attacks, we will be using less Metasploit and more manual walk-throughs because I wanted to take the time to carefully explain WHY each method works and detail how common misconfigurations happen in enterprise environments.Where Metasploit is used, everything is carefully explained and deconstructed so you can understand why and how it works. Exploits start easy and escalate in difficulty as you progress through the course.The TechniquesYou will quickly learn and execute the following escalation of privilege techniques across 5 vulnerable machines. New videos are being released weekly.Malicious Python PackageCVE Modify Launch Daemon (NEW! Just added 02/12/2021 6 New Lectures!)The ToolsYou will use ffuf, gobuster, dirsearch, nmap, Bash Scripting, Python Scripting, netcat, pwncat, Burp Suite (advanced features) and more. You will learn how to threat hunt for SQLi attacks and how to exploit Server Side Template Injection (SSTI) attacks and much much more.My dream for youBy the end of this course you should be able to use these techniques in:Your day to day workOSCP preparationCTF hackingAbout the labThere are 5 vulnerable machines.No lab setup is required as the entire environment is already established in HackTheBox VIP labsI wanted to make this course as realistic as possible while removing as many barriers to entry as possible so I've partnered with HackTheBox VIP labs to make it as easy as possible to get started.Yes, HackTheBox is an additional charge but it offers hundreds of pre-configured vulnerable machines in a lab which is accessible via a VPN connection. This means you can get started right away and don't have to waste time fumbling with VirtualBox and VMWare settings on your local system. Most of the systems are also licensed which provides the best environment for realistic exploitation.Tip:I made these videos so all commands are zoomed in close so you can watch on a mobile phone if desired. I hate watching videos on my smartphone and squinting at the command prompt or terminal. Never again will that happen.

Overview
Section 1: Techniques

Lecture 1 Malicious Python Package (Recon + Spidering)

Lecture 2 Malicious Python Package (Fuzzing + Forced Browsing)

Lecture 3 Malicious Python Package (Scraping + Scripting + Phishing)

Lecture 4 Malicious Python Package (Spying + Pivoting)

Lecture 5 Malicious Python Package (Evasion + Shell)

Lecture 6 Malicious Python Package (Horizontal Escalation)

Lecture 7 Malicious Python Package (Horizontal Escalation 2)

Lecture 8 Malicious Python Package (Horizontal Escalation 3)

Lecture 9 Malicious Python Package (Vertical Escalation)

Lecture 10 CVE (Recon + OSINT)

Lecture 11 CVE (Discovery)

Lecture 12 CVE (Source Code Review + Exploit Dev)

Lecture 13 CVE (Remote Command Execution)

Lecture 14 CVE (More Source Code Review)

Lecture 15 CVE (Horizontal Escalation)

Lecture 16 CVE (Vertical Escalation)

Lecture 17 Modify Launch Daemon (Recon + Spidering)

Lecture 18 Modify Launch Daemon (SQLi + SSTI)

Lecture 19 Modify Launch Daemon (RCE)

Lecture 20 Modify Launch Daemon (More RCE!)

Lecture 21 Modify Launch Daemon (Horizontal Escalation)

Lecture 22 Modify Launch Daemon (Vertical Escalation)

Section 2: BONUS SECTION: THANK YOU!!!

Lecture 23 BONUS LECTURE

Students interested in how attackers escalate privileges on popular Linux servers,Intermediate to Advanced cyber security students.,Students looking for OCSP practice

Buy Premium Account From My Download Links & Get Fastest Speed.





Join to our telegram Group
Information
Users of Guests are not allowed to comment this publication.
Choose Site Language
Keep downtopc Online Please

PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links: