- Basic familiarity with Linux & Windows
- Basic familiarity with TCP & UDP
- Understand, identify and exploit Windows & Linux vulnerabilities
- Perform privilege escalation
- Identity and exploit file system vulnerabilities
- Understand credentials storage and password hashes dumping
subscription required
🗒️ System or Host based attacks are attacks targeted towards specific systems oh hosts. They are about exploiting vulnerabilities within Windows and Linux operating systems, running on (internal) servers, workstations, laptops, etc.
- During a penetration test, host based attacks are applied after the target network is accessed.
- Focus on exploiting inherent vulnerabilities within the target O.S.
- Understand the target O.S. and its misconfigurations to stage an attack consisting of exploiting vulnerabilities, elevate local privileges, perform password cracking and lateral movement, etc.
Jump to the specific O.S. attacks section to delve into each topic: