3 Sections
54 Lessons
10 Weeks
Expand all sections
Collapse all sections
File Transfer
5
1.1
File Transfer Servers
1 Hour
1.2
HTTP HTTPS Client
1 Hour
1.3
HTTP File Transfer One-Liners
1 Hour
1.4
FTP Server – Python (pyftpdlib)
1 Hour
1.5
TFTP Server Setup
1 Hour
Linux Privilege Escalation
24
2.1
Linux Privilege Escalation
1 Hour
2.2
Linux System & Kernel Enumeration Commands
1 Hour
2.3
Network Interfaces and Configuration Enumeration
1 Hour
2.4
Linux Applications & Services Enumeration
1 Hour
2.5
pspy – unprivileged Linux process snooping
1 Hour
2.6
Password Mining
1 Hour
2.7
Configuration Files
1 Hour
2.8
Identifying Backup Files on Linux
1 Hour
2.9
Critical Linux System File Permissions
1 Hour
2.10
Finding Files and Directories with Special or Insecure Permissions
1 Hour
2.11
SUID Privilege Escalation
1 Hour
2.12
Custom SUID Exploit
1 Hour
2.13
Path Hijacking Path Abusing
1 Hour
2.14
Spawning Root Access via Sudo Privilege Escalation
1 Hour
2.15
Common Root Spawn Commands
1 Hour
2.16
Sudo Custom Binaries Scripts Privilege Escalation
1 Hour
2.17
LD_PRELOAD Privilege Escalation via Misconfigured sudo
1 Hour
2.18
Linux Capabilities
1 Hour
2.19
Cron Jobs & Systemd Timers in Linux
1 Hour
2.20
Cron (Wildcards) – Wildcard Injection (* Expansion)
1 Hour
2.21
Systemd and Systemd Timers
1 Hour
2.22
NFS Root Squashing
1 Hour
2.23
MySQL User-Defined Function (UDF) Exploitation
1 Hour
2.24
Linux Privilege Escalation Enumeration and Analysis Tools
1 Hour
Windows Privilege Escalation
25
3.1
Windows Privilege Escalation
1 Hour
3.2
Windows Shell
1 Hour
3.3
Windows Basic Commands
1 Hour
3.4
Copying Files and Folders in Windows
1 Hour
3.5
Changing File and Folder Attributes Using ATTRIB
1 Hour
3.6
File Permissions with CACLS
1 Hour
3.7
Windows Booting Files
1 Hour
3.8
User Management Commands
1 Hour
3.9
Add User to Administrators
1 Hour
3.10
WMIC Commands
1 Hour
3.11
Service Controller Utility Commands
1 Hour
3.12
Windows Registry
1 Hour
3.13
Managing the Windows Registry from Command Prompt
1 Hour
3.14
Alternate Data Streams (ADS)
1 Hour
3.15
PowerShell Commands
1 Hour
3.16
CMD Commands in PowerShell
1 Hour
3.17
Windows Privilege Escalation
1 Hour
3.18
Windows Kernel Exploits
1 Hour
3.19
MS10-059 – Vulnerabilities in the Tracing Feature for Services
1 Hour
3.20
Windows Certificate Dialog Elevation of Privilege Vulnerability (CVE-2019-1388)
1 Hour
3.21
Password Mining
1 Hour
3.22
Mounting VHD and VHDX Files
1 Hour
3.23
Unattended Install Files (Cleartext Passwords)
1 Hour
3.24
Web Configuration Files and Sensitive Data Discovery
1 Hour
3.25
PowerShell Command History
1 Hour
Privilege Escalation (September 2025)
Off
On
Search
Curriculum
This content is protected, please
login
and enroll in the course to view this content!
Login with your site account
Lost your password?
Remember Me
Modal title
Main Content