1 00:00:00,810 --> 00:00:08,820 Hi, before we dive into the panties thing and privilege escalation in this cause, I wanted to show 2 00:00:08,820 --> 00:00:15,330 you what we are going to learn and also, more importantly, what should you know before taking this 3 00:00:15,330 --> 00:00:24,720 course as well, before taking this course, you should be experienced with basics of the cybersecurity 4 00:00:24,720 --> 00:00:32,910 fundamentals of the cyber security in a way that you should be comfortable just diving into the penetration 5 00:00:32,910 --> 00:00:33,510 tests. 6 00:00:34,110 --> 00:00:35,920 So what do I mean by that? 7 00:00:36,450 --> 00:00:44,220 So if you have taken our complete ethical hacking course or any other course on online platforms or 8 00:00:44,220 --> 00:00:51,870 any other platform as well, then maybe you're actually aware of this hacker methodology steps. 9 00:00:52,180 --> 00:00:58,490 So if you Google hacker methodology, you will be presented in a diagram, something like this. 10 00:00:58,770 --> 00:01:04,780 So sometimes we see different names for the steps, but it generally goes like this. 11 00:01:04,830 --> 00:01:10,340 It starts with reconnaissance and scanning and identifying vulnerabilities. 12 00:01:10,590 --> 00:01:16,680 So we scan the target system that we're trying to hack into. 13 00:01:16,890 --> 00:01:19,020 We try to find the vulnerabilities. 14 00:01:19,260 --> 00:01:22,050 We try to gather information about the system. 15 00:01:22,290 --> 00:01:28,590 Then we exploit those vulnerabilities and we gain access to that system. 16 00:01:29,220 --> 00:01:38,010 And then we generally try to find a way to escalate our privileges so that we can be administrator or 17 00:01:38,010 --> 00:01:45,900 we can be rude depending on the operating system, so that we can actually report all the steps, all 18 00:01:46,110 --> 00:01:53,940 the necessary steps to make the system more secure so that we can be a good cybersecurity under the 19 00:01:53,940 --> 00:01:57,420 star cybersecurity managers or something like that. 20 00:01:57,990 --> 00:02:05,520 So what we're going to focus on during this course is not the reconnaissance or scanning or identifying 21 00:02:05,520 --> 00:02:06,320 vulnerabilities. 22 00:02:06,540 --> 00:02:09,960 Actually, we're just going to focus on this whole thing. 23 00:02:10,110 --> 00:02:18,810 OK, we're just going to focus on this whole thing, whole penetration testing system, all hacker methodology. 24 00:02:19,200 --> 00:02:28,410 But we're just going to actually intensely look at the identifying vulnerabilities and gaining access 25 00:02:28,590 --> 00:02:30,750 and also the privileged escalation. 26 00:02:31,710 --> 00:02:39,660 So if you're trying to get an OCP certificate or any other certification as well, this course is right 27 00:02:39,660 --> 00:02:40,170 for you. 28 00:02:40,440 --> 00:02:47,910 If you have the basics, if you have the fundamentals of the cyber security and if you're trying to 29 00:02:47,910 --> 00:02:53,840 take your level to the next one, then this is the right course for you. 30 00:02:54,300 --> 00:03:02,010 We're just going to dive into the penetration testing and we're going to solve a lot of captured inflects. 31 00:03:02,280 --> 00:03:04,440 We're going to work with one up. 32 00:03:04,440 --> 00:03:11,640 We're going to work with try hack me where you're going to work with Hack the Bugs RCTs Arigon to see 33 00:03:11,820 --> 00:03:19,920 how a problem or how a machine with vulnerabilities can be hacked, how the problem is solved in this 34 00:03:19,920 --> 00:03:20,660 equation. 35 00:03:20,880 --> 00:03:28,920 OK, and the privilege escalation is is a subject is a very neat subject that we should focus on very 36 00:03:28,920 --> 00:03:29,310 much. 37 00:03:29,310 --> 00:03:36,600 If we really want to go into the details of the OCP certification or the cybersecurity in general. 38 00:03:37,020 --> 00:03:47,640 And most of the time it's underestimated and it's not placed or at least it's it's not getting the attention 39 00:03:47,640 --> 00:03:50,400 it deserves in many of the courses. 40 00:03:50,580 --> 00:03:58,120 So I actually allocated a good amount of this course to the privilege escalation. 41 00:03:58,680 --> 00:04:07,680 So if you're trying to learn about privilege escalation or if you're trying to move your levels with 42 00:04:07,710 --> 00:04:13,070 your knowledge to the next level, then you're at the right place. 43 00:04:13,080 --> 00:04:16,410 But again, this is an intermediate to advanced course. 44 00:04:16,920 --> 00:04:20,130 And we're going to take a look at all of the section. 45 00:04:20,250 --> 00:04:25,650 We're going to solve a lot of seats and actually we're going to focus all the time. 46 00:04:25,650 --> 00:04:28,290 So this is all hands on training. 47 00:04:28,950 --> 00:04:32,280 Of course, we're not going to neglect the theory. 48 00:04:32,460 --> 00:04:37,020 We're just going to understand what's going on behind the curtains as well. 49 00:04:37,290 --> 00:04:39,960 But it's all going to be hands on. 50 00:04:39,960 --> 00:04:42,000 We're going to practice all the time. 51 00:04:42,180 --> 00:04:46,760 Where are you going to solve all of those things that you're seeing right now? 52 00:04:47,100 --> 00:04:52,950 And also, we're not only going to focus on the lyrics, we're going to focus on the windows as well. 53 00:04:53,250 --> 00:04:59,280 That's why we're going to need a premium hack the Bucks account at the last sections in the Arctic and 54 00:04:59,280 --> 00:04:59,670 Windows. 55 00:04:59,870 --> 00:05:06,110 Will escalation sanctions, I'm going to talk about that during the course, this is due to the Windows 56 00:05:06,110 --> 00:05:08,700 licensing features, OK? 57 00:05:09,020 --> 00:05:12,050 And if you don't want to pay for that, it's OK. 58 00:05:12,050 --> 00:05:14,210 You can just watch those sections. 59 00:05:14,450 --> 00:05:19,660 But for the 80 percent of the course, you can just go for free, OK? 60 00:05:19,670 --> 00:05:20,950 It's not a problem. 61 00:05:21,320 --> 00:05:22,810 So enough talking. 62 00:05:22,970 --> 00:05:25,460 Let's just dive into this stuff. 63 00:05:25,700 --> 00:05:29,660 We're going to start with the Bendat within the next section together.