Jump to content

Search the Community

Showing results for tags 'OSCP'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • ANNOUNCEMENTS
    • ANNOUNCEMENTS
  • CERTIFICATION - - - - - NO REQUESTS IN THESE FORUMS - - - - -
    • CISCO SYSTEMS
    • COMPTIA
    • LINUX
    • MICROSOFT
    • ORACLE
    • PROJECT MANAGEMENT
    • SECURITY CERTIFICATIONS
    • SUN MICROSYSTEMS
    • WIRELESS
    • OTHER CERTIFICATIONS
  • CISCO TECHNICAL SECTION
    • CISCO LABS
    • GNS3
    • NETWORK INFRASTRUCTURE
    • SECURITY
    • WIRELESS
    • SERVICE PROVIDERS
    • COLLABORATION, VOICE AND VIDEO
    • DATA CENTER
    • SMALL BUSINESS
  • MICROSOFT TECHNICAL SECTION
  • OTHER TECHNICAL SECTION
  • TRAINING OFFERS & REQUESTS
  • CERTCOLLECTION MALL
  • GENERAL FORUMS
  • COMMUNITY CENTER

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 6 results

  1. Penetration Testing with Kali Linux 2.0 (PWK 2.0) [hide][Hidden Content]] [hide][Hidden Content]]
  2. Hi, Someone please share Training Material for OSCP, OSWP and OSCE. I haven't found any latest material as of 2020. Thanks in advance.
  3. Anyone on here passed the OSWP exam?
  4. Udemy Linux Privilege Escalation for OSCP & Beyond! Link -[hide] [Hidden Content]] Password - [hide][Hidden Content]]
  5. Udemy - Windows Privilege Escalation for OSCP & Beyond! (2020) Finding and exploiting Windows vulnerabilities and misconfigurations to gain an administrator shell. What you'll learn Multiple methods for escalating privileges on a Windows system. In depth explanations of why and how these methods work. Tools which can help identify potential privilege escalation vulnerabilities on a Windows system. A setup script you can run on a (free) trial version of Windows 10, creating an intentionally vulnerable VM to practice privilege escalation on. Requirements A basic understanding of Windows systems Description This course teaches privilege escalation in Windows, from basics such as how permissions work, to in-depth coverage and demonstrations of actual privilege escalation techniques. The course comes with a full set of slides (150+), and a script which can be used by students to create an intentionally vulnerable Windows 10 configuration to practice their own privilege escalation skills on. This is a 100% privilege escalation course, with absolutely no filler! Please note that this course is aimed at students currently taking, or planning to take the OSCP, and thus covers more common forms of privilege escalation. Some extra methods are included, and more methods may be added in the future, however this course was not designed to cover every possible (or obscure) method. Who this course is for: Beginner and intermediate ethical hackers. Students currently taking or planning to take the PWK/OSCP course. [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]]
  6. INE - OSCP Security Technology Prep Course Course Description This course provides a foundation in advanced penetration testing that will prepare students for the Penetration Testing with Kali Linux (PWK) course offered by Offensive Security. The course will also prepare students for the Offensive Security Certified Professional (OSCP) exam, which typically proceeds the PWK course. Students should be familiar with Linux command line, common networking terminology, and basic Bash/Python scripting prior to attempting this course. Course Overview Course Introduction Introduction to Kali Linux Installing Kali Linux Command Line Refresher Kali Linux Services Bash Scripting in Kali Linux Information Gathering Information Gathering Scanning TCP vs UDP Scanning with Nmap Scanning with Nessus Scanning with Metasploit Enumeration Installing Kioptrix: Level 1 SSH Enumeration HTTP Enumeration SMB Enumeration DNS Enumeration Other Enumeration Netcat Introduction to Netcat Buffer Overflows Introduction to Buffer Overflows Fuzzing Finding the Offset Overwriting the EIP Finding Bad Characters Finding the Right Module Generating Shellcode & Gaining Root Exploitation Gaining Root with Metasploit Compiling an Exploit Modifying Shellcode Client Side Attacks Java Applet Attacks Antivirus Bypassing Pre-Exploit Password Attacks WebApp Exploitation Installing XSS & MySQL FILE Cross-Site Scripting (XSS) SQL Injection (SQLi) Local File Inclusion (LFI) Remote File Inclusion (RFI) File Transfers Introduction to File Transfers Privilege Escalation Introduction to Privilege Escalation Post Exploitation Linux Post Exploitation Windows Post Exploitation Post-Exploit Password Attacks Pivoting Capstone Kioptrix Level 1.1 Walkthrough BTRSys 2.1 Walkthrough DroopyCTF Walkthrough SickOS 1.2 Walkthrough Summary Course Conclusion [hide][Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]]
×
×
  • Create New...