Hannelore's Gitbook
SEC-335 Ethical Hacking and Penetration Testing
SEC-335 Ethical Hacking and Penetration Testing
  • SEC 335: Ethical Hacking and Penetration Testing Landing Doc
    • Module 1: Passive Recon
      • Assignment 1.1 Rules of Engagement
      • Activity 1.1 Ethical Hacking Discussion Activity
      • Assignment 1.2 Google Remote Desktop Access
      • Activity 1.2 Passive Recon Group Activity
      • Github files
    • Module 2: Active Recon
      • Lecture: Active Recon
      • Activity 2.1 Host Directory
      • Assignment 2.1 Port Scanning 1
      • Assignment 2.2 Port Scanning 2
      • NMAP Commands
      • GIT Connection Guide Doc
      • Notes
      • Github files
    • Module 3: DNS
      • Class Activty 3.1 DNS Enumeration
      • Assignment 3.1 Powershell and DNS
      • Assignment 3.2 DNS uses TCP and UDP
      • How to Push Code to Github
      • SED Command
      • AWK Command
      • Grep Command
      • Github files
    • Module 4: Manual Vulnerability Detection
      • Assignment 4.1 - "Hacking" Laws
      • Activity 4.1: Exploiting Cupcake
        • Apache 2.1.15 Vulnerabilities
        • OpenSSH 5.3 Vulnerabilities
        • Shellshock Vulnerability
      • Lecture
      • Github files
    • Module 5: Password Guessing
      • Lab 5.1: Password-Guessing
      • Lecture
      • cewl
      • rsmangler
      • dirb
      • Password Cracking Tools
      • Github files
    • Module 6: Password Cracking
      • Activity 6.0 Pre-lab
      • Lab 6.1 Password Cracking - Linux
      • Lecuture
      • Github files
      • John the Ripper
      • Hashcat
      • Understanding /etc/shadow file format on Linux
      • Installing Kali on VirtualBox
    • Module 7: Expoliting Pippin - File Upload Vulnerabilities, WebShells and Database
      • Assignment 7.1 Webshells
      • Lab 7.1 - Exploiting Pippin
    • Module 8: Reverse Shells
      • Class Activity 8.1 - Weevely
      • Class Activity 8.2 - Reverse Shells
    • Module 9: SQLi and Exploiting Gloin
      • Class Activity 9.1 SQLi Review
      • Lab 9.2 - Exploiting Gloin
      • SQLi Commands
      • Understanding SQL
      • INFORMATION_SCHEMA Table Reference
    • Module 10: Permission Errors and Exploiting Nancurinir
      • Class Activity 10.1 - Linux - Permission Vulnerabilites
      • Lab 10.2 - Exploiting Nancurinir
      • SETUID
      • Permissions
    • Module 11: The Metasploit Framework and the Final Pentest
      • Class Activity 11.1 - The Metaspolit Framework
      • Metasploit Commands
Powered by GitBook
On this page
  1. SEC 335: Ethical Hacking and Penetration Testing Landing Doc

Module 10: Permission Errors and Exploiting Nancurinir

Class Activity 10.1 - Linux - Permission VulnerabilitesLab 10.2 - Exploiting NancurinirSETUIDPermissions
PreviousINFORMATION_SCHEMA Table ReferenceNextClass Activity 10.1 - Linux - Permission Vulnerabilites