Cargando…

The Complete Pentesting and Privilege Escalation Course /

Learn and deepen your knowledge in ethical hacking topics such as pentesting and privilege escalation techniques while becoming a certified cyber security professional About This Video Execute privilege escalation for Linux Execute privilege escalation for Windows Solve CTF (Catch the Flag) solution...

Descripción completa

Detalles Bibliográficos
Autores principales: Percival, Rob (Autor), Samancioglu, Atil (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico Video
Idioma:Inglés
Publicado: Packt Publishing, 2021.
Edición:1st edition.
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007a 4500
001 OR_on1256720055
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cnu||||||||
007 vz czazuu
008 010621s2021 xx --- o vleng d
040 |a AU@  |b eng  |c AU@  |d OCLCQ 
019 |a 1305892335 
020 |z 9781801072359 
024 8 |a 9781801072359 
029 0 |a AU@  |b 000069348292 
035 |a (OCoLC)1256720055  |z (OCoLC)1305892335 
049 |a UAMI 
100 1 |a Percival, Rob,  |e author. 
245 1 4 |a The Complete Pentesting and Privilege Escalation Course /  |c Percival, Rob. 
250 |a 1st edition. 
264 1 |b Packt Publishing,  |c 2021. 
300 |a 1 online resource (1 video file, approximately 12 hr., 17 min.) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a video file 
520 |a Learn and deepen your knowledge in ethical hacking topics such as pentesting and privilege escalation techniques while becoming a certified cyber security professional About This Video Execute privilege escalation for Linux Execute privilege escalation for Windows Solve CTF (Catch the Flag) solutions and move ahead in the game level In Detail We are in an era where cyber security plays an important part and the race between attackers and defenders is tremendously growing. Companies are heavily investing to protect their data. Pentesting and privilege escalation tests prove to be a vital step to eradicate or lower down the vulnerabilities within a system, network, or application to detect weaknesses that an attacker could exploit. Throughout the course, we'll solve a number of vulnerable machines on VulnHub, TryHackMe, and HackTheBox along with the other platforms. The topic of privilege escalation will be thoroughly explained, which provides the best tools to pass a certification such as OSCP. Furthermore, we will not only focus on Linux machines but Windows machines as well. Important topics that will be covered are as follows: Advanced Linux CTF Solutions Linux Privilege Escalation Windows Privilege Escalation Kernel Exploit SUID Sudo Cronjobs Metasploit Potato Attacks BPrute Force Meterpreter Shells Meterpreter Shells By the end of this course, you will have taken a big step to advance your cyber security career. Warning: This course aims to provide a good training for people who want to be cyber security professionals. You should not break the law in any way with the offensive penetration test techniques and you accept the responsibility by taking this course. 
542 |f Packt Publishing  |g 2021 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 |a Online resource; Title from title screen (viewed May 27, 2021) 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
700 1 |a Samancioglu, Atil,  |e author. 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781801072359/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP