Modullarga qaytish
Module 08
Exploitation va Post-Exploitation
Reverse shell, privesc, credential harvesting — to'liq attack chain.
4 dars~105 daq.Simulyator komandalar
01
Reverse shell
Davom etishMaqsaddan bizga ulanuvchi shell — firewall'ni aylanib o'tish texnikasi.
25 daq.ilg'or3
02
Linux Privilege Escalation
user → root: SUID, sudo misconfig, kernel exploit, cron.
30 daq.ilg'or4
03
Password cracking
Hash'ni ochish: John the Ripper, Hashcat, hydra.
25 daq.ilg'or4
04
Post-exploitation
Persistence, lateral movement, data exfiltration.
25 daq.ilg'or3
