Comprometimento Interno e Escalação de Privilégios

Avançado

Um projeto de exploração focado exclusivamente em desafios, abrangendo acesso inicial via Metasploit, coleta de inteligência pós-exploração e fluxos de trabalho de pivotagem para comprometimento root.

cybersecurity-engineercybersecuritykalilinux

💡 Este tutorial foi traduzido do inglês com assistência de IA. Para ver o original, você pode mudar para a versão em inglês

Internal Compromise And Privilege Escalation

Review exploitation, post-exploitation, pivoting, and privilege escalation in a challenge-only course built around internal compromise. Instead of following guided labs, you will work through a staged intrusion path that begins with initial access and ends with deeper control over an internal environment.

Why It Matters

Real offensive operations do not stop at the first shell. They progress through foothold stabilization, intelligence gathering, internal reach expansion, and privilege escalation. This course is designed to test whether you can carry that workflow forward without guided instructions.

Because this is a project course, the focus is on chaining earlier skills into a complete internal compromise path. You will need to select the right workflow at each stage instead of being told which technique to apply next.

What You Will Learn

  • Gain and manage initial access with a structured exploitation workflow.
  • Perform post-exploitation gathering to strengthen a foothold.
  • Pivot into segmented internal networks to reach protected assets.
  • Escalate privileges from limited access to high-value control.
  • Think through multi-stage compromise as a connected operation rather than separate labs.

Course Roadmap

  • Metasploit-Driven Initial Access: Establish the first foothold with framework-driven exploitation.
  • Post-Exploitation Intelligence Gathering: Stabilize access and collect information that supports later movement.
  • Pivot And Root Operation: Reach deeper targets and escalate privileges to complete the compromise path.

Who This Course Is For

  • Learners who have completed the exploitation and post-exploitation courses and want a realistic review project.
  • Penetration testers practicing multi-stage internal compromise workflows.
  • Defenders who want a clearer picture of how limited access turns into broad internal control.

Outcomes

By the end of this course, you will be able to approach an internal compromise as a full workflow, from initial access through post-exploitation, pivoting, and privilege escalation to final control.

Professor

labby
Labby
Labby is the LabEx teacher.