CEH v11: Buffer Overflows, Privilege Escalation & System Access

Ethical Hacker v11    |    Intermediate
  • 3 videos | 1h 2m 19s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 20 users Rating 4.7 of 20 users (20)
Buffer overflows can be one of the more mysterious and difficult techniques to understand and employ, but when successful they can be highly useful when gaining access to target systems. In this course, you'll explore the basic concepts behind buffer overflows, as well as some useful protections against them and how to develop and deploy them in a test environment. Next, you'll examine common privilege escalation techniques, for both Windows and Linux operating systems, that can help you obtain full administrative access. Once you've fully compromised a host, you're going to want to hang on to that access for a long as possible. Finally, you'll learn about tools and techniques that will help you maintain access over a compromised target system. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Recognize the basic concepts behind a buffer overflow exploit
    recognize technologies that can help protect against buffer overflows
    identify tools that can be used to find or exploit a buffer overflow
    Recognize techniques that can obtain privilege escalation
    describe privilege escalation terminology
  • identify techniques that can be used to protect against exploits that could allow an attacker to gain full administrative level access via privilege escalation
    use privilege escalation techniques on a linux system to find files that could provide access via suid/guid
    Recognize how to defend against an attacker maintaining or getting access over a compromised system
    identify tools used to maintain access over a compromise target system
    work with tools and techniques that can be used to help you maintain access over a compromised target system

IN THIS COURSE

  • Locked
    1.  Exploiting Buffer Overflows
    19m 4s
    Upon completion of this video, you will be able to recognize the basic concepts behind a buffer overflow exploit. FREE ACCESS
  • Locked
    2.  Privilege Escalation
    25m 48s
    Find out how to identify techniques that can be used to protect against exploits that could allow an attacker to gain full administrative level access through privilege escalation. FREE ACCESS
  • Locked
    3.  Maintaining Target System Access
    17m 27s
    In this video, you will learn how to work with tools and techniques that can be used to help you maintain access to a compromised target system. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 242 users Rating 4.6 of 242 users (242)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 292 users Rating 4.6 of 292 users (292)
Rating 4.7 of 29 users Rating 4.7 of 29 users (29)
Rating 4.7 of 20 users Rating 4.7 of 20 users (20)