Offensive Security Pathway - Level 4 Of 6

Posted By: ELK1nG
Offensive Security Pathway - Level 4 Of 6

Offensive Security Pathway - Level 4 Of 6
Published 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 6.02 GB | Duration: 10h 33m

Offensive Security Colonel (OSC) - This will make you a hacker!

What you'll learn

Explore more advanced web attacks, including SQL Injection, Cross-Site Request Forgery (CSRF), Remote File Inclusion (RFI), and Server-Side Request Forgery (SSR

Understand post-exploitation techniques to gather sensitive data, monitor user activities, and maintain access.

Master privilege escalation techniques on both Windows and Linux systems using tools like WinPEAS and LinPEAS.

Learn how to hack Active Directory environments through techniques like Kerberoasting, Pass-the-Hash, and Bloodhound exploitation.

Execute advanced network attacks, including Man-in-the-Middle (MITM), ARP spoofing, and DNS poisoning.

Discover specialized Windows and Linux hacking techniques targeting advanced and lesser-known attack vectors.

And more…

Requirements

To take this course, you need intermediate hacking knowledge. At a minimum, you should have completed the fundamentals covered in Levels 1-3 or have equivalent experience.

Description

Level 4, Offensive Security Colonel (OSC), propels your hacking skills to an advanced level by diving deep into web application vulnerabilities, post-exploitation techniques, and privilege escalation on both Windows and Linux. This chapter covers sophisticated web attacks like SQL Injection, Cross-Site Request Forgery (CSRF), Remote File Inclusion (RFI), and Server-Side Request Forgery (SSRF), giving you the tools to exploit web applications beyond basic vulnerabilities.You’ll gain an understanding of post-exploitation strategies—what to do after you’ve compromised a system. This includes gathering sensitive data, monitoring user activities through keylogging, and maintaining persistence in compromised networks. Privilege escalation is crucial in offensive security, and this course will teach you how to elevate privileges on Windows and Linux systems using tools like WinPEAS and LinPEAS.One of the highlights of this chapter is hacking Active Directory, a critical skill for those looking to specialize in network attacks. You’ll learn to map and exploit AD environments using techniques like Bloodhound, Kerberoasting, and Pass-the-Hash. Additionally, you’ll explore advanced network attacks, including MITM, ARP spoofing, and DNS poisoning.This level is designed for those ready to tackle the most complex and rewarding challenges in offensive security.SyllabusWeb Attacks: Deep dive into advanced web application vulnerabilities, including SQL Injection, Cross-Site Request Forgery (CSRF), Remote File Inclusion (RFI), and Server-Side Request Forgery (SSRF).Post-Exploitation Techniques: Understanding how to gather sensitive information, keylog user activities, and establish persistence after gaining access.Privilege Escalation Techniques: Learn how to escalate privileges on Windows and Linux systems using tools like WinPEAS and LinPEAS.Hacking Active Directory: Techniques to map and exploit AD environments, including Bloodhound, Kerberoasting, Pass-the-Hash, and abusing misconfigurations.Network Attacks (Advanced): Conducting advanced network attacks like Man-in-the-Middle (MITM), ARP spoofing, and DNS poisoning.Specialized Windows Hacking: Advanced Windows exploitation techniques focusing on lesser-known attack vectors.Specialized Linux Hacking: Exploiting specific Linux distributions and advanced configurations for maximum impact.

Overview

Section 1: Introductie

Lecture 1 4.1 Intro

Lecture 2 4.2 Course Content

Lecture 3 4.3 Web Proxy Tools and BurpSuite

Lecture 4 4.4 Web Reconnaissance Tools

Lecture 5 4.5 cURL

Lecture 6 4.6 Basic Web Knowledge

Lecture 7 4.7 Basic Website Enumeration

Lecture 8 4.8 API Testing

Lecture 9 4.9 Cross-Side Request Forgery

Lecture 10 4.10 Server-Side Request Forgery

Lecture 11 4.11 Cross-Site Scripting

Lecture 12 4.12 Directory Traversal

Lecture 13 4.13 File Inclusion - Local and Remote

Lecture 14 4.14 PHP Wrappers

Lecture 15 4.15 File Upload Vulnerabilities

Lecture 16 4.16 Command Injection

Lecture 17 4.17 SQL Injection

Lecture 18 4.18 Active Directory Introduction

Lecture 19 4.19 Active Directory Enumeration

Lecture 20 4.20 Mapping Active Directory - Bloodhound

Lecture 21 4.21 AD Password Spraying

Lecture 22 4.22 AS-REP Roasting

Lecture 23 4.23 Kerberoasting

Lecture 24 4.24 DES-Based AS-REP Roasting and Kerberoasting

Lecture 25 4.25 Golden & Silver Tickets

Lecture 26 4.26 Pass the Hash and OverPass the Hash

Lecture 27 4.27 Pass the Ticket

Lecture 28 4.28 Relay NTLMv2 Hashes

Lecture 29 4.29 TimeRoasting

Lecture 30 4.30 Active Directory User Security Permissions

Lecture 31 4.31 Unconstrained Delegation

Lecture 32 4.32 Constrained Delegation

Lecture 33 4.33 Resource-Based Constrained Delegation

Lecture 34 4.34 Windows Privilege Escalation - Manual Enumeration

Lecture 35 4.35 Windows Privilege Escalation - Automatic Enumeration tools & techniques

Lecture 36 4.36 Windows Shadow Copies

Lecture 37 4.37 Binary & DLL Hijacking

Lecture 38 4.38 Unquoted Service Paths

Lecture 39 4.39 Scheduled Tasks

Lecture 40 4.40 Windows Exploits

Lecture 41 4.41 Abusing Windows Privileges

Lecture 42 4.42 Exploiting Microsoft Office Macro's

Lecture 43 4.43 Abusing Microsoft Library Files and Shortcuts

Lecture 44 4.44 Linux Privilege Escalation - Manual Enumeration

Lecture 45 4.45 Linux Automatic Enumeration

Lecture 46 4.46 SUID Programs and Linux Capabilities

Lecture 47 4.47 Special Sudo Permissions

Lecture 48 4.48 Exploiting Writeable Path

Lecture 49 4.49 SSH Key Injection

Lecture 50 4.50 Abusing SystemCTL

Lecture 51 4.51 CRON Job Exploitation

Lecture 52 4.52 System Kernel Vulnerabilities

Lecture 53 4.53 Wrapping Up

Security professionals and penetration testers looking to deepen their expertise in web application and network attacks.,Ethical hackers interested in post-exploitation techniques and privilege escalation on Windows and Linux systems.,IT specialists working in Active Directory environments who want to learn offensive tactics to secure their networks.,Red team members seeking advanced knowledge of network and OS-level exploitation techniques.,Cybersecurity enthusiasts with intermediate hacking knowledge, eager to master advanced exploitation strategies.,Web developers interested in understanding how attackers target web applications and how to defend against them.