Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The Complete Pentesting & Privilege Escalation Course
Training Overview
Description of Training
Video Overview (1:50)
1. Introduction
1. Introduction (1:50)
2. Course Manual (5:29)
2. Bandit
3. Bandit Intro (13:41)
4. Bandit File Find Cat (17:34)
5. Bandit Strings Grep (11:39)
6. Bandit Base64 (11:29)
7. Bandit Gzip Bzip Tar (19:12)
8. Bandit Nmap (15:03)
9. Bandit Diff Ssh (10:21)
10. Bandit Suid (9:45)
11. Bandit Cron (10:51)
12. Bandit Cron Advanced (18:04)
13. Bandit NCat Python (11:07)
14. Bandit Vim More (12:37)
15. Bandit Git (20:17)
16. Bandit Shell (6:25)
3. Wakanda
17. Wakanda Setup (9:04)
18. Web Service (21:31)
19. Gathering More Information (13:06)
20. Python Reverse Shell (9:42)
21. Sudo Privilege Escalation (13:16)
4. Mr. Robot
22. Mr. Robot Setup (17:12)
23. Username Brute Force (21:40)
24. Password Brute Force (10:25)
25. Hacking Wordpress (11:16)
26. Changing User (6:46)
27. Suid Privilege Escalation (13:28)
5. Fristi Leaks
28. Fristi Leaks Setup (12:10)
29. Hacking the Server (12:09)
30. Switching to Admin (14:28)
31. Cryptology (9:25)
32. Root (12:20)
6. Linux Privilege Escalation
33. Vulnerable Machine in This Section
34. TryHackMe Setup (16:43)
35. Enumeration (11:41)
36. Kernel Exploit (19:11)
37. More Password Enumeration (9:28)
38. Sudo List (5:32)
39. Shadow (15:21)
40. Preload (9:32)
41. What is Suid? (8:38)
42. Suid Privilege Escalation (17:31)
43. Path (7:49)
44. Environment Variables (8:55)
45. Crontab (11:13)
46. Sudo Vulnerability (7:22)
7. Windows Privilege Escalation
47. HackTheBox Setup (7:19)
48. HackTheBox VPN (8:15)
49. First Machine Setup (6:03)
50. Hacking Windows (16:52)
51. Windows Command Prompt (20:22)
52. Exploit Suggester (10:47)
53. Other Tools (14:37)
54. Admin (12:09)
55. Potato Attack (15:52)
56. Manual Privilege Escalation (11:06)
8. Arctic
57. Arctic Setup (13:48)
58. Admin Dashboard (11:57)
59. Cold Fusion (18:48)
60. Schelevator (13:10)
9. Closing
61. Closing (2:25)
12. Bandit Cron Advanced
Download
Complete and Continue
Become a Member and Get
Unlimited Access
to 340+ Top Cyber Security Courses.
UPGRADE NOW