eJPT
Ctrlk
  • 👋Welcome
  • Tools
    • 🔭Escaneo y Enumeración
  • SECTION 1: Assessment Methodologies
    • Assessment Methodologies: Information Gathering
    • Assessment Methodologies: Footprinting & Scanning
    • Assessment Methodologies: Enumeration
    • Assessment Methodologies: Vulnerability Assessment
  • SECTION 2: Host & Networking Auditing
    • Assessment Methodologies: Auditing Fundamentals
  • SECTION 3: Host & Network Penetration Testing
    • Host & Network Penetration Testing: System/Host Based Attacks
    • Host & Network Penetration Testing: Network-Based Attacks
    • Host & Network Penetration Testing: The Metasploit Framework (MSF)
    • Host & Network Penetration Testing: Exploitation
    • Host & Network Penetration Testing: Post-Exploitation
      • Introduction
      • Windows Enumeration
      • Linux Enumeration
      • Transferring Files
      • Shells
      • Escalation
        • Windows Privilege Escalation
        • Linux Privilege Escalation
      • Persistence
      • Dumping & Cracking
      • Pivoting Lesson
      • Clearing
  • Host & Network Penetration Testing: Social Engineering
  • SECTION 4: Web Application Penetration Testing
    • Introduction to the Web & HTTP Protocol
Powered by GitBook
On this page
  1. SECTION 3: Host & Network Penetration Testing
  2. Host & Network Penetration Testing: Post-Exploitation

Escalation

Windows Privilege EscalationLinux Privilege Escalation
PreviousShellsNextWindows Privilege Escalation

Last updated 1 year ago