Back to Browse

Privilege Escalation Techniques | 3. Gaining Access (Exploitation)

3.1K views
Sep 27, 2021
20:16

Privilege Escalation Techniques is available from: Packt.com: https://bit.ly/3u7eykV Amazon: https://amzn.to/3F14myL This is the “Code in Action” video for chapter 3 of Privilege Escalation Techniques by Alexis Ahmed, published by Packt. It includes the following topics: 00:11 Setting up the Metasploit framework 06:30 Network mapping with Nmap 13:10 Vulnerability assessment Privilege escalation is a crucial step in the exploitation life cycle of a penetration tester. It helps penetration testers to set up persistence and facilitates lateral movement. This book is one-of-a-kind as it covers a range of privilege escalation techniques and tools for both Windows and Linux systems. Connect with Packt: Find us on Facebook: http://www.facebook.com/PacktPub Find us on Twitter: http://www.twitter.com/packtpub Video created by Alexis Ahmed

Download

0 formats

No download links available.

Privilege Escalation Techniques | 3. Gaining Access (Exploitation) | NatokHD