Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Offensive Security Pathway - Level 4 Of 6

    Posted By: ELK1nG
    Offensive Security Pathway - Level 4 Of 6

    Offensive Security Pathway - Level 4 Of 6
    Published 3/2025
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 6.02 GB | Duration: 10h 33m

    Offensive Security Colonel (OSC) - This will make you a hacker!

    What you'll learn

    Explore more advanced web attacks, including SQL Injection, Cross-Site Request Forgery (CSRF), Remote File Inclusion (RFI), and Server-Side Request Forgery (SSR

    Understand post-exploitation techniques to gather sensitive data, monitor user activities, and maintain access.

    Master privilege escalation techniques on both Windows and Linux systems using tools like WinPEAS and LinPEAS.

    Learn how to hack Active Directory environments through techniques like Kerberoasting, Pass-the-Hash, and Bloodhound exploitation.

    Execute advanced network attacks, including Man-in-the-Middle (MITM), ARP spoofing, and DNS poisoning.

    Discover specialized Windows and Linux hacking techniques targeting advanced and lesser-known attack vectors.

    And more…

    Requirements

    To take this course, you need intermediate hacking knowledge. At a minimum, you should have completed the fundamentals covered in Levels 1-3 or have equivalent experience.

    Description

    Level 4, Offensive Security Colonel (OSC), propels your hacking skills to an advanced level by diving deep into web application vulnerabilities, post-exploitation techniques, and privilege escalation on both Windows and Linux. This chapter covers sophisticated web attacks like SQL Injection, Cross-Site Request Forgery (CSRF), Remote File Inclusion (RFI), and Server-Side Request Forgery (SSRF), giving you the tools to exploit web applications beyond basic vulnerabilities.You’ll gain an understanding of post-exploitation strategies—what to do after you’ve compromised a system. This includes gathering sensitive data, monitoring user activities through keylogging, and maintaining persistence in compromised networks. Privilege escalation is crucial in offensive security, and this course will teach you how to elevate privileges on Windows and Linux systems using tools like WinPEAS and LinPEAS.One of the highlights of this chapter is hacking Active Directory, a critical skill for those looking to specialize in network attacks. You’ll learn to map and exploit AD environments using techniques like Bloodhound, Kerberoasting, and Pass-the-Hash. Additionally, you’ll explore advanced network attacks, including MITM, ARP spoofing, and DNS poisoning.This level is designed for those ready to tackle the most complex and rewarding challenges in offensive security.SyllabusWeb Attacks: Deep dive into advanced web application vulnerabilities, including SQL Injection, Cross-Site Request Forgery (CSRF), Remote File Inclusion (RFI), and Server-Side Request Forgery (SSRF).Post-Exploitation Techniques: Understanding how to gather sensitive information, keylog user activities, and establish persistence after gaining access.Privilege Escalation Techniques: Learn how to escalate privileges on Windows and Linux systems using tools like WinPEAS and LinPEAS.Hacking Active Directory: Techniques to map and exploit AD environments, including Bloodhound, Kerberoasting, Pass-the-Hash, and abusing misconfigurations.Network Attacks (Advanced): Conducting advanced network attacks like Man-in-the-Middle (MITM), ARP spoofing, and DNS poisoning.Specialized Windows Hacking: Advanced Windows exploitation techniques focusing on lesser-known attack vectors.Specialized Linux Hacking: Exploiting specific Linux distributions and advanced configurations for maximum impact.

    Overview

    Section 1: Introductie

    Lecture 1 4.1 Intro

    Lecture 2 4.2 Course Content

    Lecture 3 4.3 Web Proxy Tools and BurpSuite

    Lecture 4 4.4 Web Reconnaissance Tools

    Lecture 5 4.5 cURL

    Lecture 6 4.6 Basic Web Knowledge

    Lecture 7 4.7 Basic Website Enumeration

    Lecture 8 4.8 API Testing

    Lecture 9 4.9 Cross-Side Request Forgery

    Lecture 10 4.10 Server-Side Request Forgery

    Lecture 11 4.11 Cross-Site Scripting

    Lecture 12 4.12 Directory Traversal

    Lecture 13 4.13 File Inclusion - Local and Remote

    Lecture 14 4.14 PHP Wrappers

    Lecture 15 4.15 File Upload Vulnerabilities

    Lecture 16 4.16 Command Injection

    Lecture 17 4.17 SQL Injection

    Lecture 18 4.18 Active Directory Introduction

    Lecture 19 4.19 Active Directory Enumeration

    Lecture 20 4.20 Mapping Active Directory - Bloodhound

    Lecture 21 4.21 AD Password Spraying

    Lecture 22 4.22 AS-REP Roasting

    Lecture 23 4.23 Kerberoasting

    Lecture 24 4.24 DES-Based AS-REP Roasting and Kerberoasting

    Lecture 25 4.25 Golden & Silver Tickets

    Lecture 26 4.26 Pass the Hash and OverPass the Hash

    Lecture 27 4.27 Pass the Ticket

    Lecture 28 4.28 Relay NTLMv2 Hashes

    Lecture 29 4.29 TimeRoasting

    Lecture 30 4.30 Active Directory User Security Permissions

    Lecture 31 4.31 Unconstrained Delegation

    Lecture 32 4.32 Constrained Delegation

    Lecture 33 4.33 Resource-Based Constrained Delegation

    Lecture 34 4.34 Windows Privilege Escalation - Manual Enumeration

    Lecture 35 4.35 Windows Privilege Escalation - Automatic Enumeration tools & techniques

    Lecture 36 4.36 Windows Shadow Copies

    Lecture 37 4.37 Binary & DLL Hijacking

    Lecture 38 4.38 Unquoted Service Paths

    Lecture 39 4.39 Scheduled Tasks

    Lecture 40 4.40 Windows Exploits

    Lecture 41 4.41 Abusing Windows Privileges

    Lecture 42 4.42 Exploiting Microsoft Office Macro's

    Lecture 43 4.43 Abusing Microsoft Library Files and Shortcuts

    Lecture 44 4.44 Linux Privilege Escalation - Manual Enumeration

    Lecture 45 4.45 Linux Automatic Enumeration

    Lecture 46 4.46 SUID Programs and Linux Capabilities

    Lecture 47 4.47 Special Sudo Permissions

    Lecture 48 4.48 Exploiting Writeable Path

    Lecture 49 4.49 SSH Key Injection

    Lecture 50 4.50 Abusing SystemCTL

    Lecture 51 4.51 CRON Job Exploitation

    Lecture 52 4.52 System Kernel Vulnerabilities

    Lecture 53 4.53 Wrapping Up

    Security professionals and penetration testers looking to deepen their expertise in web application and network attacks.,Ethical hackers interested in post-exploitation techniques and privilege escalation on Windows and Linux systems.,IT specialists working in Active Directory environments who want to learn offensive tactics to secure their networks.,Red team members seeking advanced knowledge of network and OS-level exploitation techniques.,Cybersecurity enthusiasts with intermediate hacking knowledge, eager to master advanced exploitation strategies.,Web developers interested in understanding how attackers target web applications and how to defend against them.