CEH v12: Buffer Overflows, Privilege Escalation, and System Access
CEH v12
| Intermediate
- 3 videos | 1h 30m
- Includes Assessment
- Earns a Badge
Buffer overflows can be one of the more mysterious and difficult techniques to understand and employ, but when successful they can be highly useful when gaining access to target systems. In this course, you'll explore the basic concepts behind buffer overflows, as well as some useful protections against them and how to develop and deploy them in a test environment. Next, you'll examine common privilege escalation techniques, for both Windows and Linux operating systems, that can help you obtain full administrative access. Once you've fully compromised a host, you're going to want to hang on to that access for a long as possible. Finally, you'll learn about tools and techniques that will help you maintain access over a compromised target system. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.
WHAT YOU WILL LEARN
-
Recognize the basic concepts behind a buffer overflow exploitidentify tools that can be used to find or exploit a buffer overflowrecognize technologies that can help protect against buffer overflowsRecognize techniques that can obtain privilege escalationidentify techniques that can be used to protect against exploits that could allow an attacker to gain full administrative level access via privilege escalation
-
describe privilege escalation terminologyuse privilege escalation techniques on a linux system to find files that could provide access via suid/guidRecognize how to defend against an attacker maintaining or getting access over a compromised systemwork with tools and techniques that can be used to help you maintain access over a compromised target systemidentify tools used to maintain access over a compromise target system
IN THIS COURSE
-
43m 35sUpon completion of this video, you will be able to outline the basic concepts behind a buffer overflow and some useful protections against buffer overflows, as well as how to develop and deploy a buffer overflow in a test environment. FREE ACCESS
-
27m 20sAfter completing this video, you will be able to recognize common privilege escalation techniques for both Windows and Linux operating systems that can help you obtain full administrative-level access. FREE ACCESS
-
19m 5sUpon completion of this video, you will be able to identify tools and techniques that will help you maintain your access over a compromised target system. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.