CEH v12: Buffer Overflows, Privilege Escalation, and System Access

CEH v12    |    Intermediate
  • 3 videos | 1h 30m
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Buffer overflows can be one of the more mysterious and difficult techniques to understand and employ, but when successful they can be highly useful when gaining access to target systems. In this course, you'll explore the basic concepts behind buffer overflows, as well as some useful protections against them and how to develop and deploy them in a test environment. Next, you'll examine common privilege escalation techniques, for both Windows and Linux operating systems, that can help you obtain full administrative access. Once you've fully compromised a host, you're going to want to hang on to that access for a long as possible. Finally, you'll learn about tools and techniques that will help you maintain access over a compromised target system. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.

WHAT YOU WILL LEARN

  • Recognize the basic concepts behind a buffer overflow exploit
    identify tools that can be used to find or exploit a buffer overflow
    recognize technologies that can help protect against buffer overflows
    Recognize techniques that can obtain privilege escalation
    identify techniques that can be used to protect against exploits that could allow an attacker to gain full administrative level access via privilege escalation
  • describe privilege escalation terminology
    use privilege escalation techniques on a linux system to find files that could provide access via suid/guid
    Recognize how to defend against an attacker maintaining or getting access over a compromised system
    work with tools and techniques that can be used to help you maintain access over a compromised target system
    identify tools used to maintain access over a compromise target system

IN THIS COURSE

  • Locked
    1.  Buffer Overflows
    43m 35s
    Upon completion of this video, you will be able to outline the basic concepts behind a buffer overflow and some useful protections against buffer overflows, as well as how to develop and deploy a buffer overflow in a test environment. FREE ACCESS
  • Locked
    2.  Privilege Escalation
    27m 20s
    After completing this video, you will be able to recognize common privilege escalation techniques for both Windows and Linux operating systems that can help you obtain full administrative-level access. FREE ACCESS
  • Locked
    3.  Maintaining System Access
    19m 5s
    Upon completion of this video, you will be able to identify tools and techniques that will help you maintain your access over a compromised target system. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)