CEH v11: Buffer Overflows, Privilege Escalation & System Access
Ethical Hacker v11
| Intermediate
- 3 videos | 1h 2m 19s
- Includes Assessment
- Earns a Badge
Buffer overflows can be one of the more mysterious and difficult techniques to understand and employ, but when successful they can be highly useful when gaining access to target systems. In this course, you'll explore the basic concepts behind buffer overflows, as well as some useful protections against them and how to develop and deploy them in a test environment. Next, you'll examine common privilege escalation techniques, for both Windows and Linux operating systems, that can help you obtain full administrative access. Once you've fully compromised a host, you're going to want to hang on to that access for a long as possible. Finally, you'll learn about tools and techniques that will help you maintain access over a compromised target system. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
-
Recognize the basic concepts behind a buffer overflow exploitrecognize technologies that can help protect against buffer overflowsidentify tools that can be used to find or exploit a buffer overflowRecognize techniques that can obtain privilege escalationdescribe privilege escalation terminology
-
identify techniques that can be used to protect against exploits that could allow an attacker to gain full administrative level access via privilege escalationuse privilege escalation techniques on a linux system to find files that could provide access via suid/guidRecognize how to defend against an attacker maintaining or getting access over a compromised systemidentify tools used to maintain access over a compromise target systemwork with tools and techniques that can be used to help you maintain access over a compromised target system
IN THIS COURSE
-
19m 4sUpon completion of this video, you will be able to recognize the basic concepts behind a buffer overflow exploit. FREE ACCESS
-
25m 48sFind out how to identify techniques that can be used to protect against exploits that could allow an attacker to gain full administrative level access through privilege escalation. FREE ACCESS
-
17m 27sIn this video, you will learn how to work with tools and techniques that can be used to help you maintain access to a compromised target system. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.