Skocz do zawartości

Aktywacja nowych użytkowników
Zakazane produkcje

  • advertisement_alt
  • advertisement_alt
  • advertisement_alt
Courses2024

Udemy - Offensive Security Pathway - Level 4 Of 6

Rekomendowane odpowiedzi

fb4bd5141283fb840dbecf0c5db09622.avif
Free Download Udemy - Offensive Security Pathway - Level 4 Of 6
Published: 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 6.02 GB | Duration: 10h 33m
Offensive Security Colonel (OSC) - This will make you a hacker!

What you'll learn
Explore more advanced web attacks, including SQL Injection, Cross-Site Request Forgery (CSRF), Remote File Inclusion (RFI), and Server-Side Request Forgery (SSR
Understand post-exploitation techniques to gather sensitive data, monitor user activities, and maintain access.
Master privilege escalation techniques on both Windows and Linux systems using tools like WinPEAS and LinPEAS.
Learn how to hack Active Directory environments through techniques like Kerberoasting, Pass-the-Hash, and Bloodhound exploitation.
Execute advanced network attacks, including Man-in-the-Middle (MITM), ARP spoofing, and DNS poisoning.
Discover specialized Windows and Linux hacking techniques targeting advanced and lesser-known attack vectors.
And more.
Requirements
To take this course, you need intermediate hacking knowledge. At a minimum, you should have completed the fundamentals covered in Levels 1-3 or have equivalent experience.
Description
Level 4, Offensive Security Colonel (OSC), propels your hacking skills to an advanced level by diving deep into web application vulnerabilities, post-exploitation techniques, and privilege escalation on both Windows and Linux. This chapter covers sophisticated web attacks like SQL Injection, Cross-Site Request Forgery (CSRF), Remote File Inclusion (RFI), and Server-Side Request Forgery (SSRF), giving you the tools to exploit web applications beyond basic vulnerabilities.You'll gain an understanding of post-exploitation strategies-what to do after you've compromised a system. This includes gathering sensitive data, monitoring user activities through keylogging, and maintaining persistence in compromised networks. Privilege escalation is crucial in offensive security, and this course will teach you how to elevate privileges on Windows and Linux systems using tools like WinPEAS and LinPEAS.One of the highlights of this chapter is hacking Active Directory, a critical skill for those looking to specialize in network attacks. You'll learn to map and exploit AD environments using techniques like Bloodhound, Kerberoasting, and Pass-the-Hash. Additionally, you'll explore advanced network attacks, including MITM, ARP spoofing, and DNS poisoning.This level is designed for those ready to tackle the most complex and rewarding challenges in offensive security.SyllabusWeb Attacks: Deep dive into advanced web application vulnerabilities, including SQL Injection, Cross-Site Request Forgery (CSRF), Remote File Inclusion (RFI), and Server-Side Request Forgery (SSRF).Post-Exploitation Techniques: Understanding how to gather sensitive information, keylog user activities, and establish persistence after gaining access.Privilege Escalation Techniques: Learn how to escalate privileges on Windows and Linux systems using tools like WinPEAS and LinPEAS.Hacking Active Directory: Techniques to map and exploit AD environments, including Bloodhound, Kerberoasting, Pass-the-Hash, and abusing misconfigurations.Network Attacks (Advanced): Conducting advanced network attacks like Man-in-the-Middle (MITM), ARP spoofing, and DNS poisoning.Specialized Windows Hacking: Advanced Windows exploitation techniques focusing on lesser-known attack vectors.Specialized Linux Hacking: Exploiting specific Linux distributions and advanced configurations for maximum impact.
Overview
Section 1: Introductie
Lecture 1 4.1 Intro
Lecture 2 4.2 Course Content
Lecture 3 4.3 Web Proxy Tools and BurpSuite
Lecture 4 4.4 Web Reconnaissance Tools
Lecture 5 4.5 cURL
Lecture 6 4.6 Basic Web Knowledge
Lecture 7 4.7 Basic Website Enumeration
Lecture 8 4.8 API Testing
Lecture 9 4.9 Cross-Side Request Forgery
Lecture 10 4.10 Server-Side Request Forgery
Lecture 11 4.11 Cross-Site Scripting
Lecture 12 4.12 Directory Traversal
Lecture 13 4.13 File Inclusion - Local and Remote
Lecture 14 4.14 PHP Wrappers
Lecture 15 4.15 File Upload Vulnerabilities
Lecture 16 4.16 Command Injection
Lecture 17 4.17 SQL Injection
Lecture 18 4.18 Active Directory Introduction
Lecture 19 4.19 Active Directory Enumeration
Lecture 20 4.20 Mapping Active Directory - Bloodhound
Lecture 21 4.21 AD Password Spraying
Lecture 22 4.22 AS-REP Roasting
Lecture 23 4.23 Kerberoasting
Lecture 24 4.24 DES-Based AS-REP Roasting and Kerberoasting
Lecture 25 4.25 Golden & Silver Tickets
Lecture 26 4.26 Pass the Hash and OverPass the Hash
Lecture 27 4.27 Pass the Ticket
Lecture 28 4.28 Relay NTLMv2 Hashes
Lecture 29 4.29 TimeRoasting
Lecture 30 4.30 Active Directory User Security Permissions
Lecture 31 4.31 Unconstrained Delegation
Lecture 32 4.32 Constrained Delegation
Lecture 33 4.33 Resource-Based Constrained Delegation
Lecture 34 4.34 Windows Privilege Escalation - Manual Enumeration
Lecture 35 4.35 Windows Privilege Escalation - Automatic Enumeration tools & techniques
Lecture 36 4.36 Windows Shadow Copies
Lecture 37 4.37 Binary & DLL Hijacking
Lecture 38 4.38 Unquoted Service Paths
Lecture 39 4.39 Scheduled Tasks
Lecture 40 4.40 Windows Exploits
Lecture 41 4.41 Abusing Windows Privileges
Lecture 42 4.42 Exploiting Microsoft Office Macro's
Lecture 43 4.43 Abusing Microsoft Library Files and Shortcuts
Lecture 44 4.44 Linux Privilege Escalation - Manual Enumeration
Lecture 45 4.45 Linux Automatic Enumeration
Lecture 46 4.46 SUID Programs and Linux Capabilities
Lecture 47 4.47 Special Sudo Permissions
Lecture 48 4.48 Exploiting Writeable Path
Lecture 49 4.49 SSH Key Injection
Lecture 50 4.50 Abusing SystemCTL
Lecture 51 4.51 CRON Job Exploitation
Lecture 52 4.52 System Kernel Vulnerabilities
Lecture 53 4.53 Wrapping Up
Security professionals and penetration testers looking to deepen their expertise in web application and network attacks.,Ethical hackers interested in post-exploitation techniques and privilege escalation on Windows and Linux systems.,IT specialists working in Active Directory environments who want to learn offensive tactics to secure their networks.,Red team members seeking advanced knowledge of network and OS-level exploitation techniques.,Cybersecurity enthusiasts with intermediate hacking knowledge, eager to master advanced exploitation strategies.,Web developers interested in understanding how attackers target web applications and how to defend against them.

Homepage:

Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.






Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.

No Password - Links are Interchangeable

Udostępnij tę odpowiedź


Odnośnik do odpowiedzi
Udostępnij na innych stronach

Dołącz do dyskusji

Możesz dodać zawartość już teraz a zarejestrować się później. Jeśli posiadasz już konto, zaloguj się aby dodać zawartość za jego pomocą.

Gość
Dodaj odpowiedź do tematu...

×   Wklejono zawartość z formatowaniem.   Usuń formatowanie

  Dozwolonych jest tylko 75 emoji.

×   Odnośnik został automatycznie osadzony.   Przywróć wyświetlanie jako odnośnik

×   Przywrócono poprzednią zawartość.   Wyczyść edytor

×   Nie możesz bezpośrednio wkleić grafiki. Dodaj lub załącz grafiki z adresu URL.

    • 1 Posts
    • 7 Views
    • 1 Posts
    • 6 Views
    • 1 Posts
    • 7 Views
    • 1 Posts
    • 6 Views
    • 1 Posts
    • 6 Views

×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Korzystając z tej witryny, wyrażasz zgodę na nasze Warunki użytkowania.