Cross-Platform Elevation of Privileges

In this course, students will learn to leverage sophisticated scalability methods and misconfiguration, in various operating systems. Students will also learn how to escalate privileges using local and remote exploits and techniques. This course features hands-on simulations provided by @Cywar – a gamified training and assessment platform by HackerU Solutions.

Category:

Description

Prerequisites:
-Working knowledge of the Linux OS.
-Working knowledge of the Windows OS.
-Knowledge of information security, computer networking, and common protocols.
-An understanding of security-related terms.

Module-1 :
Local Privilege Escalation In Windows OS
-Windows Local Escalation technics

Module-2 :
Post Exploitation
-Post Exploitation Techniques
-Credential Extraction
-Persistence & Hidden Users
-Covering the Tracks

Module-3 :
Local Privilege Escalation In Linux OS
-Linux Local Privilege Escalation technics

Module-4 :
Linux Remote Escalation
-Automated Tasks
-Bad Path Configuration

Module-5 :
Windows Advanced Remote Escalation
-DLL Hijacking
-DLL Injection
-Exploiting Unquoted Services
-Exploiting Group Policy Preferences

Module-6 :
Architecture Vulnerabilities
-Dirty COW
-Eternal Blue

Module-7 :
Pivoting
-PsExec & WMIexec
-Pass the Hash & NTLM
-Session Hijacking

Datasheets

  • Datasheet 1

Video



Categories


Partners: HackerU