The Complete Pentesting and Privilege Escalation Course:
Learn and deepen your knowledge in ethical hacking topics such as pentesting and privilege escalation techniques while becoming a certified cyber security professional About This Video Execute privilege escalation for Linux Execute privilege escalation for Windows Solve CTF (Catch the Flag) solution...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Körperschaft: | |
Format: | Elektronisch Video |
Sprache: | Englisch |
Veröffentlicht: |
[Erscheinungsort nicht ermittelbar]
Packt Publishing
2021
|
Ausgabe: | 1st edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781801072359/?ar |
Zusammenfassung: | Learn and deepen your knowledge in ethical hacking topics such as pentesting and privilege escalation techniques while becoming a certified cyber security professional About This Video Execute privilege escalation for Linux Execute privilege escalation for Windows Solve CTF (Catch the Flag) solutions and move ahead in the game level In Detail We are in an era where cyber security plays an important part and the race between attackers and defenders is tremendously growing. Companies are heavily investing to protect their data. Pentesting and privilege escalation tests prove to be a vital step to eradicate or lower down the vulnerabilities within a system, network, or application to detect weaknesses that an attacker could exploit. Throughout the course, we'll solve a number of vulnerable machines on VulnHub, TryHackMe, and HackTheBox along with the other platforms. The topic of privilege escalation will be thoroughly explained, which provides the best tools to pass a certification such as OSCP. Furthermore, we will not only focus on Linux machines but Windows machines as well. Important topics that will be covered are as follows: Advanced Linux CTF Solutions Linux Privilege Escalation Windows Privilege Escalation Kernel Exploit SUID Sudo Cronjobs Metasploit Potato Attacks BPrute Force Meterpreter Shells Meterpreter Shells By the end of this course, you will have taken a big step to advance your cyber security career. Warning: This course aims to provide a good training for people who want to be cyber security professionals. You should not break the law in any way with the offensive penetration test techniques and you accept the responsibility by taking this course. |
Beschreibung: | Online resource; Title from title screen (viewed May 27, 2021) |
Umfang: | 1 Online-Ressource (1 video file, approximately 12 hr., 17 min.) |
ISBN: | 9781801072359 |
Internformat
MARC
LEADER | 00000cgm a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-065998065 | ||
003 | DE-627-1 | ||
005 | 20240228121359.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 210614s2021 xx ||| |o o ||eng c | ||
020 | |a 9781801072359 |9 978-1-80107-235-9 | ||
035 | |a (DE-627-1)065998065 | ||
035 | |a (DE-599)KEP065998065 | ||
035 | |a (ORHE)9781801072359 | ||
035 | |a (DE-627-1)065998065 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Percival, Rob |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The Complete Pentesting and Privilege Escalation Course |c Percival, Rob |
250 | |a 1st edition. | ||
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b Packt Publishing |c 2021 | |
300 | |a 1 Online-Ressource (1 video file, approximately 12 hr., 17 min.) | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; Title from title screen (viewed May 27, 2021) | ||
520 | |a Learn and deepen your knowledge in ethical hacking topics such as pentesting and privilege escalation techniques while becoming a certified cyber security professional About This Video Execute privilege escalation for Linux Execute privilege escalation for Windows Solve CTF (Catch the Flag) solutions and move ahead in the game level In Detail We are in an era where cyber security plays an important part and the race between attackers and defenders is tremendously growing. Companies are heavily investing to protect their data. Pentesting and privilege escalation tests prove to be a vital step to eradicate or lower down the vulnerabilities within a system, network, or application to detect weaknesses that an attacker could exploit. Throughout the course, we'll solve a number of vulnerable machines on VulnHub, TryHackMe, and HackTheBox along with the other platforms. The topic of privilege escalation will be thoroughly explained, which provides the best tools to pass a certification such as OSCP. Furthermore, we will not only focus on Linux machines but Windows machines as well. Important topics that will be covered are as follows: Advanced Linux CTF Solutions Linux Privilege Escalation Windows Privilege Escalation Kernel Exploit SUID Sudo Cronjobs Metasploit Potato Attacks BPrute Force Meterpreter Shells Meterpreter Shells By the end of this course, you will have taken a big step to advance your cyber security career. Warning: This course aims to provide a good training for people who want to be cyber security professionals. You should not break the law in any way with the offensive penetration test techniques and you accept the responsibility by taking this course. | ||
650 | 4 | |a Electronic videos | |
700 | 1 | |a Samancioglu, Atil |e VerfasserIn |4 aut | |
710 | 2 | |a Safari, an O'Reilly Media Company. |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781801072359/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-065998065 |
---|---|
_version_ | 1821494945541783552 |
adam_text | |
any_adam_object | |
author | Percival, Rob Samancioglu, Atil |
author_corporate | Safari, an O'Reilly Media Company |
author_corporate_role | ctb |
author_facet | Percival, Rob Samancioglu, Atil Safari, an O'Reilly Media Company |
author_role | aut aut |
author_sort | Percival, Rob |
author_variant | r p rp a s as |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)065998065 (DE-599)KEP065998065 (ORHE)9781801072359 |
edition | 1st edition. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03069cgm a22003852 4500</leader><controlfield tag="001">ZDB-30-ORH-065998065</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121359.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">210614s2021 xx ||| |o o ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781801072359</subfield><subfield code="9">978-1-80107-235-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)065998065</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP065998065</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781801072359</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)065998065</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Percival, Rob</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The Complete Pentesting and Privilege Escalation Course</subfield><subfield code="c">Percival, Rob</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 video file, approximately 12 hr., 17 min.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; Title from title screen (viewed May 27, 2021)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Learn and deepen your knowledge in ethical hacking topics such as pentesting and privilege escalation techniques while becoming a certified cyber security professional About This Video Execute privilege escalation for Linux Execute privilege escalation for Windows Solve CTF (Catch the Flag) solutions and move ahead in the game level In Detail We are in an era where cyber security plays an important part and the race between attackers and defenders is tremendously growing. Companies are heavily investing to protect their data. Pentesting and privilege escalation tests prove to be a vital step to eradicate or lower down the vulnerabilities within a system, network, or application to detect weaknesses that an attacker could exploit. Throughout the course, we'll solve a number of vulnerable machines on VulnHub, TryHackMe, and HackTheBox along with the other platforms. The topic of privilege escalation will be thoroughly explained, which provides the best tools to pass a certification such as OSCP. Furthermore, we will not only focus on Linux machines but Windows machines as well. Important topics that will be covered are as follows: Advanced Linux CTF Solutions Linux Privilege Escalation Windows Privilege Escalation Kernel Exploit SUID Sudo Cronjobs Metasploit Potato Attacks BPrute Force Meterpreter Shells Meterpreter Shells By the end of this course, you will have taken a big step to advance your cyber security career. Warning: This course aims to provide a good training for people who want to be cyber security professionals. You should not break the law in any way with the offensive penetration test techniques and you accept the responsibility by taking this course.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic videos</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Samancioglu, Atil</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Safari, an O'Reilly Media Company.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781801072359/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-065998065 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:26Z |
institution | BVB |
isbn | 9781801072359 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 video file, approximately 12 hr., 17 min.) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Packt Publishing |
record_format | marc |
spelling | Percival, Rob VerfasserIn aut The Complete Pentesting and Privilege Escalation Course Percival, Rob 1st edition. [Erscheinungsort nicht ermittelbar] Packt Publishing 2021 1 Online-Ressource (1 video file, approximately 12 hr., 17 min.) zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; Title from title screen (viewed May 27, 2021) Learn and deepen your knowledge in ethical hacking topics such as pentesting and privilege escalation techniques while becoming a certified cyber security professional About This Video Execute privilege escalation for Linux Execute privilege escalation for Windows Solve CTF (Catch the Flag) solutions and move ahead in the game level In Detail We are in an era where cyber security plays an important part and the race between attackers and defenders is tremendously growing. Companies are heavily investing to protect their data. Pentesting and privilege escalation tests prove to be a vital step to eradicate or lower down the vulnerabilities within a system, network, or application to detect weaknesses that an attacker could exploit. Throughout the course, we'll solve a number of vulnerable machines on VulnHub, TryHackMe, and HackTheBox along with the other platforms. The topic of privilege escalation will be thoroughly explained, which provides the best tools to pass a certification such as OSCP. Furthermore, we will not only focus on Linux machines but Windows machines as well. Important topics that will be covered are as follows: Advanced Linux CTF Solutions Linux Privilege Escalation Windows Privilege Escalation Kernel Exploit SUID Sudo Cronjobs Metasploit Potato Attacks BPrute Force Meterpreter Shells Meterpreter Shells By the end of this course, you will have taken a big step to advance your cyber security career. Warning: This course aims to provide a good training for people who want to be cyber security professionals. You should not break the law in any way with the offensive penetration test techniques and you accept the responsibility by taking this course. Electronic videos Samancioglu, Atil VerfasserIn aut Safari, an O'Reilly Media Company. MitwirkendeR ctb |
spellingShingle | Percival, Rob Samancioglu, Atil The Complete Pentesting and Privilege Escalation Course Electronic videos |
title | The Complete Pentesting and Privilege Escalation Course |
title_auth | The Complete Pentesting and Privilege Escalation Course |
title_exact_search | The Complete Pentesting and Privilege Escalation Course |
title_full | The Complete Pentesting and Privilege Escalation Course Percival, Rob |
title_fullStr | The Complete Pentesting and Privilege Escalation Course Percival, Rob |
title_full_unstemmed | The Complete Pentesting and Privilege Escalation Course Percival, Rob |
title_short | The Complete Pentesting and Privilege Escalation Course |
title_sort | complete pentesting and privilege escalation course |
topic | Electronic videos |
topic_facet | Electronic videos |
work_keys_str_mv | AT percivalrob thecompletepentestingandprivilegeescalationcourse AT samanciogluatil thecompletepentestingandprivilegeescalationcourse AT safarianoreillymediacompany thecompletepentestingandprivilegeescalationcourse AT percivalrob completepentestingandprivilegeescalationcourse AT samanciogluatil completepentestingandprivilegeescalationcourse AT safarianoreillymediacompany completepentestingandprivilegeescalationcourse |