Cross-Platform Elevation of Privileges
In this course, students will learn to leverage sophisticated scalability methods and misconfiguration, in various operating systems. Students will also learn how to escalate privileges using local and remote exploits and techniques. This course features hands-on simulations provided by @Cywar – a gamified training and assessment platform by HackerU Solutions.
Description
Prerequisites:
-Working knowledge of the Linux OS.
-Working knowledge of the Windows OS.
-Knowledge of information security, computer networking, and common protocols.
-An understanding of security-related terms.
Module-1 :
Local Privilege Escalation In Windows OS
-Windows Local Escalation technics
Module-2 :
Post Exploitation
-Post Exploitation Techniques
-Credential Extraction
-Persistence & Hidden Users
-Covering the Tracks
Module-3 :
Local Privilege Escalation In Linux OS
-Linux Local Privilege Escalation technics
Module-4 :
Linux Remote Escalation
-Automated Tasks
-Bad Path Configuration
Module-5 :
Windows Advanced Remote Escalation
-DLL Hijacking
-DLL Injection
-Exploiting Unquoted Services
-Exploiting Group Policy Preferences
Module-6 :
Architecture Vulnerabilities
-Dirty COW
-Eternal Blue
Module-7 :
Pivoting
-PsExec & WMIexec
-Pass the Hash & NTLM
-Session Hijacking