CEH v11: Buffer Overflows, Privilege Escalation, & System Access

Ethical Hacker v11    |    Intermediate
  • 3 Videos | 1h 2m 19s
  • Includes Assessment
  • Earns a Badge
Buffer overflows can be one of the more mysterious and difficult techniques to understand and employ, but when successful they can be highly useful when gaining access to target systems. In this course, you'll explore the basic concepts behind buffer overflows, as well as some useful protections against them and how to develop and deploy them in a test environment. Next, you'll examine common privilege escalation techniques, for both Windows and Linux operating systems, that can help you obtain full administrative access. Once you've fully compromised a host, you're going to want to hang on to that access for a long as possible. Finally, you'll learn about tools and techniques that will help you maintain access over a compromised target system. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • identify tools that can be used to find or exploit a buffer overflow
    recognize technologies that can help protect against buffer overflows
    recognize the basic concepts behind a buffer overflow exploit
    describe privilege escalation terminology
    identify techniques that can be used to protect against exploits that could allow an attacker to gain full administrative level access via privilege escalation
  • recognize techniques that can obtain privilege escalation
    use privilege escalation techniques on a Linux system to find files that could provide access via suid/guid
    identify tools used to maintain access over a compromise target system
    recognize how to defend against an attacker maintaining or getting access over a compromised system
    work with tools and techniques that can be used to help you maintain access over a compromised target system

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.