
Train On-Demand
Choose the training you want from 18,000+ videos of instructor-led content. Watch anywhere.
Learn MoreThe ability to exploit host-based vulnerabilities is an important skill set to master on your journey to becoming a skilled penetration tester. In this course, you will learn about the various services, protocols and vulnerabilities in both Windows and Linux systems and how they can be exploited. You will also learn about the various inherent filesystem and privilege escalation vulnerabilities in both Windows and Linux systems and how they can be exploited. Furthermore, you will also learn about how Windows & Linux systems store password hashes and how they can be dumped for the purpose of password cracking or Pass-The-Hash attacks in the case of Windows. The objective of this course is to give you in-depth hands-on skills necessary to exploit Windows and Linux systems. By the end of this course, you will have the skills necessary to exploit inherent vulnerabilities in both Windows and Linux systems.
Instructor for this course
Alexis Ahmed
Course Introduction
Introduction To System/Host Based Attacks
Overview Of Windows Vulnerabilities
Frequently Exploited Windows Services
Exploiting Microsoft IIS WebDAV
Windows: IIS Server DAVTest
Exploiting WebDAV With Metasploit
Windows: IIS Server: WebDav Metasploit
Exploiting SMB With PsExec
Windows: SMB Server PSexec
Exploiting Windows MS17-010 SMB Vulnerability (EternalBlue)
Exploiting RDP
Windows: Insecure RDP Service
Exploiting Windows CVE-2019-0708 RDP Vulnerability (BlueKeep)
Exploiting WinRM
WinRM: Exploitation with Metasploit
Windows Kernel Exploits
Bypassing UAC With UACMe
UAC Bypass: UACMe
Access Token Impersonation
Privilege Escalation: Impersonate
Alternate Data Streams
Windows Password Hashes
Searching For Passwords In Windows Configuration Files
Dumping Hashes With Mimikatz
Pass-The-Hash Attacks
Frequently Exploited Linux Services
Exploiting Bash CVE-2014-6271 Vulnerability (Shellshock)
Exploiting FTP
Exploiting SSH
Exploiting SAMBA
Linux Kernel Exploits
Exploiting Misconfigured Cron Jobs
Exploiting SUID Binaries
Dumping Linux Password Hashes
Course Conclusion
Take your technical training into your own hands and stay engaged with our learn-by-doing platform where you can put your skills to the test with hands-on exercises, quizzes, and labs.
Choose the training you want from 18,000+ videos of instructor-led content. Watch anywhere.
Learn MoreINE quizzes, labs, projects, and exercises help reinforce your knowledge.
Learn MoreOrganized training helps guide you through the most relevant subjects for certification prep.
Learn MoreWe add new courses and learning materials to the platform weekly so you're always up-to-date.
Learn MoreIf you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?