CEH v12: Buffer Overflows Privilege Escalation and System Access
Buffer overflows can be one of the more mysterious and difficult techniques to understand and employ but when successful they can be highly useful when gaining access to target systems.
In this course you;ll explore the basic concepts behind buffer overflows as well as some useful protections against them and how to develop and deploy them in a test environment. Next you;ll examine common privilege escalation techniques for both Windows and Linux operating systems that can help you obtain full administrative access. Once you;ve fully compromised a host you;re going to want to hang on to that access for a long as possible. Finally you;ll learn about tools and techniques that will help you maintain access over a compromised target system.
This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.