Penetration Testing Professional: Post-Exploitation & Lateral Movement

In this free demo, learn how to perform detailed enumeration, privilege escalation and restricted shell escaping after compromising a Linux target.

Sign up to receive a free demo

This Penetration Testing Professional Demo Module Covers

  • Enumerating a Linux target during post-exploitation
  • Identify and leverage configuration files and SUID binaries or sudo misconfigurations for privilege escalation
  • Learn how to escape restricted shells, crack the shadow on a Linux target and obtain credentials from a Linux target's memory

Try Our Training For Free With The Starter Pass

Net Orders Checkout

Item Price Qty Total
Subtotal $0.00
Shipping
Total

Shipping Address

Shipping Methods