Companies Home Search Profile

Advanced Techniques for Ethical Hacking

Focused View

Malcolm Shore

1:02:35

69 View
  • 01 - Taking the next step in your ethical hacking career.mp4
    00:50
  • 02 - What you should know.mp4
    00:31
  • 03 - Disclaimer.mp4
    00:52
  • 01 - Being detected.mp4
    03:10
  • 02 - Trying stealthy shells.mp4
    05:08
  • 03 - Leaving footprints.mp4
    03:25
  • 01 - What is living off the land.mp4
    03:25
  • 02 - Using PowerHub.mp4
    06:24
  • 03 - Using the PHPSploit shell.mp4
    03:15
  • 01 - Stealthy linux enumeration.mp4
    03:46
  • 02 - Stealthy Windows enumeration.mp4
    04:00
  • 03 - Powering up our escalation.mp4
    02:13
  • 01 - Setting up and using an SSH tunnel.mp4
    03:25
  • 02 - Exfiltrating data over ICMP.mp4
    04:06
  • 03 - Exfiltration via DNS.mp4
    04:09
  • 01 - Using Baron Samedit to escalate in Linux.mp4
    01:57
  • 02 - Escalating through a dirty pipe.mp4
    01:27
  • 03 - Escalating through a nightmare.mp4
    04:30
  • 04 - Exploiting the Active Domain.mp4
    05:08
  • 01 - What's next.mp4
    00:54
  • Description


    Once you’re proficient with basic ethical hacking techniques, you may be wondering about your next play. Advanced skills in evasion become increasingly necessary when you’re entering and operating on more complex systems. In this course, instructor Malcolm Shore shows you techniques to become a savvier penetration tester and take a big leap in your ethical hacking career.

    Explore strategies to avoid detection and minimize your footprint every step of the way—using shells, encoders, and encryptors, living off the land, and leaving no trace. Get practical tips on advanced enumeration with tools like LinPEAS, WinPEAS, and SharpUp, as well as tunneling with an SSH connection to dig deeper into networks, systems, and websites. Malcolm walks you through the steps of safely exfiltrating information, with pointers on how to escalate your privileges along the way.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Malcolm Shore
    Malcolm Shore
    Instructor's Courses
    Wide range of IT experience ranging from systems programming to policy and strategic planning. Strong expertise in applied IT security, focused on policy and governance. Teaching post graduate security (forensics, information warfare, security management, applied cryptography) Past interests include virtual worlds and web3d developments. Current work focusing on Cloud, security architectures, and national-level cybersecurity Specialties: SABSA, Cloud, Cryptography, Cybersecurity Strategy, Network Survivability
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 20
    • duration 1:02:35
    • Release Date 2022/12/28