Windows & Linux System Administration for Penetration Testing

Presented by

Hamza Sirag

About this talk

This webinar will go over various systems administration concepts in both Windows and Linux operating systems. To be successful in penetration testing you must understand the full potential of both Windows and Linux from an administrative perspective and how you leverage built-in operating system commands, utilities, and features for exploitation. This webinar is for those who are interested in penetration testing/ethical hacking. This webinar will provide you with a foundation to become successful in penetration testing. You will also be provided with list of external resources and areas you should focus on to further develop your penetration testing skills. Objectives – What You Will Leave Knowing: Common Windows and Linux services – and how they are commonly abused Common Windows and Linux configurations – and how they are commonly abused How Windows and Linux manage passwords – locally and within a domain Windows and Linux privileges - including techniques for elevating privileges Windows and Linux command line usage for penetration testing Built in programming/development/scripting languages that can be leveraged for exploitation in Windows and Linux Interactive & non-interactive shells File transfer techniques in Windows and Linux Windows and Linux firewalls Built in tools in Windows and Linux for troubleshooting exploitation techniques Enumerating information from Windows and Linux using built in tools Leveraging common Windows and Linux systems administration tools for exploitation and lateral movement External resources available to further learn about Windows and Linux systems administration

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (51)
Subscribers (2832)
Founded in 1999, ITPG Secure Compliance is dedicated to preventing information security breaches that put organizations at risk of noncompliance. Based in Vienna, VA, our subject matter experts are sought-after authorities on PCI DSS, HIPAA Security and Privacy Rule, FERPA and other industry security requirements. Our IT security consultants and virtual CISOs have decades of experience assessing security risks and vulnerabilities, recommending mitigation strategies and mapping remediation plans to strengthen enterprise security posture. We work with corporate, association, and state agency clients that span multiple industries and for multiple resellers. Visit our web site