Skip to content
5063CEM: Practical Pen Testing
Remote Code Execution, and Insecure Deserialization
Initializing search
5063CEM: Practical Pen Testing
Home
Essentials
Essentials
Module Guide
Teaching and Learning
MS Teams
Assessment
Assessment
Overview
CW1
CW2
Guides
Guides
Using These Materials
Home Lab Setup
Docker Guide
Github Labs
0x01: What is Pentesting?
0x01: What is Pentesting?
Module Overview
Lecture Materials
Lecture Materials
What is Security
What is Ethical hacking ?
The 3 Pillars of Cyber Security
The CIA Triangle
Threats to Businesses
Types of Attack
Who are the Hackers
Lab Tasks
Lab Tasks
Hacking Lab
Trainer Videos
0x02: The Petest Process
0x02: The Petest Process
Lecture Materials
Lecture Materials
Measuring Security
The Pentest Process
Assessing Risk
Lab Tasks
Lab Tasks
Lab
0x03: Shells, talking to a server
0x03: Shells, talking to a server
Materials
Materials
Shells
Remote Shells
SSH
Netcat
RCE
Web Shells
Lab Tasks
Lab Tasks
Overview
SSH Lab
Web Shells Lab
0x04: Reconnaissance
0x04: Reconnaissance
Materials
Materials
Reconnisance
Passive Recon Intro
Search Engines
Simple Searches
Google Hacking
Active Recon
Port Scanning
NMAP
NSE
Lab Tasks
Lab Tasks
Lab
0x05 Privileges and Permisions
0x05 Privileges and Permisions
Videos
Materials
Materials
Privilege Escalation
Linux Permissions Intro
Windows Permissions Intro
Linux: ACLs
Legitimately Elevating Privileges
Legitimately Elevating Privileges
Sudo
Sudo Walkthrough
SUID
SUID Walkthrogh
Capabilities
Capabilities Walkthrough
0x06 Linux System Eunumeration
0x06 Linux System Eunumeration
0x07 Remote Code Execution, and Deserialisation
0x07 Remote Code Execution, and Deserialisation
Materials
Materials
Remote Code Execution
Insecure Deserialisation
Deserialise Examples
Lab
Lab
Lab
0x08 More SQL Injection
0x08 More SQL Injection
Videos
Materials
Materials
Database Enumeration
Blind SQL Injecton
Tools for SQL Injection
NoSQL Injection
Lab
Lab
Lab
0x09 Overflows 1
0x09 Overflows 1
Introduction
Remote Code Execution, and Insecure Deserialization.
Back to top