5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Certifications     EC Council     Certified Ethical hacker     Certified Ethical Hacker (CEH) v11

Buffer overflows can be one of the more mysterious and difficult techniques to understand and employ, but when successful they can be highly useful when gaining access to target systems. In this course, you'll explore the basic concepts behind buffer overflows, as well as some useful protections against them and how to develop and deploy them in a test environment. Next, you'll examine common privilege escalation techniques, for both Windows and Linux operating systems, that can help you obtain full administrative access. Once you've fully compromised a host, you're going to want to hang on to that access for a long as possible. Finally, you'll learn about tools and techniques that will help you maintain access over a compromised target system. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.



Objectives

CEH v11: Buffer Overflows, Privilege Escalation & System Access

  • identify tools that can be used to find or exploit a buffer overflow
  • recognize technologies that can help protect against buffer overflows
  • recognize the basic concepts behind a buffer overflow exploit
  • describe privilege escalation terminology
  • identify techniques that can be used to protect against exploits that could allow an attacker to gain full administrative level access via privilege escalation
  • recognize techniques that can obtain privilege escalation
  • use privilege escalation techniques on a Linux system to find files that could provide access via suid/guid
  • identify tools used to maintain access over a compromise target system
  • recognize how to defend against an attacker maintaining or getting access over a compromised system
  • work with tools and techniques that can be used to help you maintain access over a compromised target system