2.1 System/Host Based Attacks
⚡ Prerequisites
Basic familiarity with Linux & Windows
Basic familiarity with TCP & UDP
📕 Learning Objectives
Understand, identify and exploit Windows & Linux vulnerabilities
Perform privilege escalation
Identity and exploit file system vulnerabilities
Understand credentials storage and password hashes dumping
🔬 Training list - PentesterAcademy/INE Labs
subscription required
Last updated