
{"id":122705,"date":"2025-08-28T16:41:24","date_gmt":"2025-08-28T16:41:24","guid":{"rendered":"https:\/\/express24.ir\/d\/product\/%d8%af%d9%88%d8%b1%d9%87-%d9%be%db%8c%d8%b4%d8%b1%d9%81%d8%aa%d9%87-%d8%a7%d8%b1%d8%aa%d9%82%d8%a7%d8%a1-%d8%a7%d9%85%d8%aa%db%8c%d8%a7%d8%b2%d8%a7%d8%aa-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3-%d8%a8\/"},"modified":"2025-08-28T16:41:40","modified_gmt":"2025-08-28T16:41:40","slug":"%d8%af%d9%88%d8%b1%d9%87-%d9%be%db%8c%d8%b4%d8%b1%d9%81%d8%aa%d9%87-%d8%a7%d8%b1%d8%aa%d9%82%d8%a7%d8%a1-%d8%a7%d9%85%d8%aa%db%8c%d8%a7%d8%b2%d8%a7%d8%aa-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3-%d8%a8","status":"publish","type":"product","link":"https:\/\/express24.ir\/d\/product\/%d8%af%d9%88%d8%b1%d9%87-%d9%be%db%8c%d8%b4%d8%b1%d9%81%d8%aa%d9%87-%d8%a7%d8%b1%d8%aa%d9%82%d8%a7%d8%a1-%d8%a7%d9%85%d8%aa%db%8c%d8%a7%d8%b2%d8%a7%d8%aa-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3-%d8%a8\/","title":{"rendered":"\u062f\u0648\u0631\u0647 \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0628\u0627 Hack The Box \u0628\u0631 \u0631\u0648\u06cc \u0641\u0644\u0634 32GB"},"content":{"rendered":"<table class=\"course-info-table\" border=\"1\" cellpadding=\"8\" cellspacing=\"0\" style=\"width: 100%; margin-bottom: 20px; border-collapse: collapse;\">\n<tr>\n<th style=\"background-color: #f5f5f5; text-align: right; width: 40%;\">\u0646\u0627\u0645 \u0645\u062d\u0635\u0648\u0644 \u0628\u0647 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc<\/th>\n<td style=\"text-align: right;\"> Udemy &#8211; Advanced Linux Privilege Escalation with Hack The Box 2022-11 &#8211;  <\/td>\n<\/tr>\n<tr>\n<th style=\"background-color: #f5f5f5; text-align: right;\">\u0646\u0627\u0645 \u0645\u062d\u0635\u0648\u0644 \u0628\u0647 \u0641\u0627\u0631\u0633\u06cc<\/th>\n<td style=\"text-align: right;\">\u062f\u0648\u0631\u0647 \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0628\u0627 Hack The Box \u0628\u0631 \u0631\u0648\u06cc \u0641\u0644\u0634 32GB<\/td>\n<\/tr>\n<tr>\n<th style=\"background-color: #f5f5f5; text-align: right;\">\u0632\u0628\u0627\u0646<\/th>\n<td style=\"text-align: right;\">\u0627\u0646\u06af\u0644\u06cc\u0633\u06cc \u0628\u0627 \u0632\u06cc\u0631\u0646\u0648\u06cc\u0633 \u0641\u0627\u0631\u0633\u06cc<\/td>\n<\/tr>\n<tr>\n<th style=\"background-color: #f5f5f5; text-align: right;\">\u0646\u0648\u0639 \u0645\u062d\u0635\u0648\u0644<\/th>\n<td style=\"text-align: right;\">\u0622\u0645\u0648\u0632\u0634 \u0648\u06cc\u062f\u06cc\u0648\u06cc\u06cc<\/td>\n<\/tr>\n<tr>\n<th style=\"background-color: #f5f5f5; text-align: right;\">\u0646\u062d\u0648\u0647 \u062a\u062d\u0648\u06cc\u0644<\/th>\n<td style=\"text-align: right;\">\u0627\u0631\u0627\u0626\u0647 \u0634\u062f\u0647 \u0628\u0631 \u0631\u0648\u06cc \u0641\u0644\u0634 \u0645\u0645\u0648\u0631\u06cc<\/td>\n<\/tr>\n<\/table>\n<div style=\"border: 2px dashed #4CAF50; border-radius: 16px; padding: 20px; background: #f9fff9; font-family: 'IRANSans', sans-serif;\">\r\n  <h2 style=\"color: #2E7D32; margin-top: 0;\">\ud83c\udf93 \u0645\u062c\u0645\u0648\u0639\u0647\u200c\u0627\u06cc \u0628\u06cc\u200c\u0646\u0638\u06cc\u0631 <\/h2>\r\n  <ul style=\"list-style-type: \u2705; padding-left: 20px; font-size: 16px; line-height: 1.8;\">\r\n    <li><strong>\u0632\u06cc\u0631\u0646\u0648\u06cc\u0633 \u06a9\u0627\u0645\u0644\u0627\u064b \u0641\u0627\u0631\u0633\u06cc<\/strong> \u0628\u0631\u0627\u06cc \u062f\u0631\u06a9 \u0622\u0633\u0627\u0646 \u0648 \u0633\u0631\u06cc\u0639<\/li>\r\n    <li>\u0627\u0631\u0627\u0626\u0647\u200c\u0634\u062f\u0647 \u0631\u0648\u06cc <strong>\u0641\u0644\u0634 32 \u06af\u06cc\u06af\u0627\u0628\u0627\u06cc\u062a\u06cc<\/strong><\/li>\r\n    <li>\u0622\u0645\u0627\u062f\u0647 \u0627\u0631\u0633\u0627\u0644 \u0641\u0648\u0631\u06cc \u0628\u0647 \u0633\u0631\u0627\u0633\u0631 \u06a9\u0634\u0648\u0631<\/li>\r\n\r\n  <\/ul>\r\n  <p style=\"color: #388E3C; font-weight: bold; font-size: 18px; margin-top: 20px;\">\r\n    \ud83d\udcda \u0634\u0631\u0648\u0639 \u06cc\u0627\u062f\u06af\u06cc\u0631\u06cc \u0627\u0632 \u0647\u0645\u06cc\u0646 \u0627\u0645\u0631\u0648\u0632 \u2014 \u0641\u0631\u0635\u062a \u0631\u0634\u062f \u0631\u0627 \u0627\u0632 \u062f\u0633\u062a \u0646\u062f\u0647!\r\n  <\/p>\r\n\t\r\n\t  <p style=\"padding-left: 20px; font-size: 16px; line-height: 1.8;\">\r\n    \u062c\u0647\u062a \u067e\u06cc\u06af\u06cc\u0631\u06cc \u0633\u0641\u0627\u0631\u0634\u060c \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u06cc\u062f \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0648\u0627\u062a\u0633\u200c\u0627\u067e \u0628\u0627 \u0634\u0645\u0627\u0631\u0647 <strong>09395106248<\/strong> \u06cc\u0627 \u0622\u06cc\u062f\u06cc \u062a\u0644\u06af\u0631\u0627\u0645\u06cc <strong>@ma_limbs<\/strong> \u062f\u0631 \u062a\u0645\u0627\u0633 \u0628\u0627\u0634\u06cc\u062f.\r\n  <\/p>\r\n<\/div>\n<article class=\"violin-complex-pieces\">\n<h1>\u062f\u0648\u0631\u0647 \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0628\u0627 Hack The Box \u0628\u0631 \u0631\u0648\u06cc \u0641\u0644\u0634 32GB<\/h1>\n<div class='section-box'>\n<p>\u062f\u0631 \u062f\u0646\u06cc\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc\u060c \u062f\u0627\u0646\u0634 \u0648 \u0645\u0647\u0627\u0631\u062a \u062f\u0631 \u0632\u0645\u06cc\u0646\u0647 \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a (Privilege Escalation) \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0644\u06cc\u0646\u0648\u06a9\u0633\u060c \u06cc\u06a9\u06cc \u0627\u0632 \u062d\u06cc\u0627\u062a\u06cc\u200c\u062a\u0631\u06cc\u0646 \u0648 \u067e\u0631\u06a9\u0627\u0631\u0628\u0631\u062f\u062a\u0631\u06cc\u0646 \u062a\u0648\u0627\u0646\u0645\u0646\u062f\u06cc\u200c\u0647\u0627 \u0628\u0631\u0627\u06cc \u0645\u062a\u062e\u0635\u0635\u0627\u0646 \u0627\u0645\u0646\u06cc\u062a\u060c \u0647\u06a9\u0631\u0647\u0627\u06cc \u0627\u062e\u0644\u0627\u0642\u06cc \u0648 \u067e\u0698\u0648\u0647\u0634\u06af\u0631\u0627\u0646 \u062d\u0648\u0632\u0647 \u0627\u0645\u0646\u06cc\u062a \u0645\u062d\u0633\u0648\u0628 \u0645\u06cc\u200c\u0634\u0648\u062f. \u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u0622\u0645\u0648\u0632\u0634\u06cc \u062a\u062e\u0635\u0635\u06cc\u060c \u0628\u0627 \u062a\u0645\u0631\u06a9\u0632 \u0628\u0631 \u062a\u06a9\u0646\u06cc\u06a9\u200c\u0647\u0627\u06cc \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0648 \u0639\u0645\u0644\u06cc\u0627\u062a\u06cc\u060c \u0634\u0645\u0627 \u0631\u0627 \u0628\u0647 \u062a\u0633\u0644\u0637\u06cc \u0639\u0645\u06cc\u0642 \u0628\u0631 \u0631\u0648\u0634\u200c\u0647\u0627\u06cc \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0648 \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0644\u06cc\u0646\u0648\u06a9\u0633 \u06cc\u0627\u0631\u06cc \u0645\u06cc\u200c\u0631\u0633\u0627\u0646\u062f. \u0627\u06cc\u0646 \u0645\u062c\u0645\u0648\u0639\u0647 \u0622\u0645\u0648\u0632\u0634\u06cc \u0646\u0641\u06cc\u0633\u060c \u062f\u0631 \u0642\u0627\u0644\u0628 \u06cc\u06a9 \u0641\u0644\u0634 \u0645\u0645\u0648\u0631\u06cc 32 \u06af\u06cc\u06af\u0627\u0628\u0627\u06cc\u062a\u06cc \u0627\u0631\u0627\u0626\u0647 \u0634\u062f\u0647 \u0648 \u0634\u0627\u0645\u0644 \u0648\u06cc\u062f\u0626\u0648\u0647\u0627\u06cc \u0622\u0645\u0648\u0632\u0634\u06cc \u0628\u0627 \u06a9\u06cc\u0641\u06cc\u062a \u0628\u0627\u0644\u0627\u060c \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u0645\u0648\u0631\u062f \u0646\u06cc\u0627\u0632 \u0648 \u067e\u0631\u0648\u0698\u0647\u200c\u0647\u0627\u06cc \u0639\u0645\u0644\u06cc \u0645\u062a\u0639\u062f\u062f \u0627\u0633\u062a \u06a9\u0647 \u06cc\u0627\u062f\u06af\u06cc\u0631\u06cc \u0631\u0627 \u0628\u0631\u0627\u06cc \u0634\u0645\u0627 \u062a\u0633\u0647\u06cc\u0644 \u0645\u06cc\u200c\u0628\u062e\u0634\u062f.<\/p>\n<\/div>\n<h2>\u0686\u0631\u0627 \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0645\u0647\u0645 \u0627\u0633\u062a\u061f<\/h2>\n<div class='section-box'>\n<p>\u062f\u0631 \u0633\u0646\u0627\u0631\u06cc\u0648\u0647\u0627\u06cc \u062a\u0633\u062a \u0646\u0641\u0648\u0630 \u0648 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc\u060c \u067e\u0633 \u0627\u0632 \u062f\u0633\u062a\u06cc\u0627\u0628\u06cc \u0627\u0648\u0644\u06cc\u0647 \u0628\u0647 \u06cc\u06a9 \u0633\u06cc\u0633\u062a\u0645\u060c \u0645\u0631\u062d\u0644\u0647 \u0628\u0639\u062f\u06cc \u0648 \u062d\u06cc\u0627\u062a\u06cc\u060c \u0627\u0631\u062a\u0642\u0627\u0621 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u06cc\u06a9 \u06a9\u0627\u0631\u0628\u0631 \u0645\u0639\u0645\u0648\u0644\u06cc \u0628\u0647 \u0633\u0637\u062d \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0627\u0644\u0627\u062a\u0631 (\u0645\u0627\u0646\u0646\u062f root) \u0627\u0633\u062a. \u0627\u06cc\u0646 \u0627\u0645\u0631 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc\u200c\u062f\u0647\u062f \u062a\u0627 \u06a9\u0646\u062a\u0631\u0644 \u06a9\u0627\u0645\u0644 \u0633\u06cc\u0633\u062a\u0645 \u0631\u0627 \u0628\u0647 \u062f\u0633\u062a \u06af\u0631\u0641\u062a\u0647\u060c \u0628\u0647 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062d\u0633\u0627\u0633 \u062f\u0633\u062a\u0631\u0633\u06cc \u067e\u06cc\u062f\u0627 \u06a9\u0646\u062f\u060c \u0628\u062f\u0627\u0641\u0632\u0627\u0631 \u0646\u0635\u0628 \u06a9\u0646\u062f \u06cc\u0627 \u0627\u0642\u062f\u0627\u0645\u0627\u062a \u0645\u062e\u0631\u0628 \u062f\u06cc\u06af\u0631\u06cc \u0631\u0627 \u0627\u0646\u062c\u0627\u0645 \u062f\u0647\u062f. \u062a\u0633\u0644\u0637 \u0628\u0631 \u0627\u06cc\u0646 \u062a\u06a9\u0646\u06cc\u06a9\u200c\u0647\u0627 \u0628\u0631\u0627\u06cc \u062f\u0641\u0627\u0639 \u0627\u0632 \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627 \u062f\u0631 \u0628\u0631\u0627\u0628\u0631 \u062d\u0645\u0644\u0627\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0646\u06cc\u0632 \u0627\u0645\u0631\u06cc \u0636\u0631\u0648\u0631\u06cc \u0627\u0633\u062a\u060c \u0632\u06cc\u0631\u0627 \u062a\u06cc\u0645\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0628\u0627\u06cc\u062f \u0628\u062a\u0648\u0627\u0646\u0646\u062f \u0631\u0648\u0634\u200c\u0647\u0627\u06cc \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0631\u0627 \u062f\u0631\u06a9 \u06a9\u0631\u062f\u0647 \u0648 \u0646\u0642\u0627\u0637 \u0636\u0639\u0641 \u0627\u062d\u062a\u0645\u0627\u0644\u06cc \u0631\u0627 \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0648 \u0631\u0641\u0639 \u0646\u0645\u0627\u06cc\u0646\u062f.<\/p>\n<\/div>\n<h2>\u0627\u0647\u062f\u0627\u0641 \u06a9\u0644\u06cc\u062f\u06cc \u0627\u06cc\u0646 \u062f\u0648\u0631\u0647<\/h2>\n<div class='section-box'>\n<p>\u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u062c\u0627\u0645\u0639\u060c \u0628\u0627 \u0647\u062f\u0641 \u062a\u0648\u0627\u0646\u0645\u0646\u062f\u0633\u0627\u0632\u06cc \u0641\u0631\u0627\u06af\u06cc\u0631\u0627\u0646 \u062f\u0631 \u0632\u0645\u06cc\u0646\u0647\u200c\u0647\u0627\u06cc \u0632\u06cc\u0631 \u0637\u0631\u0627\u062d\u06cc \u0634\u062f\u0647 \u0627\u0633\u062a:<\/p>\n<ul>\n<li>\u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0648 \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u062a\u0646\u0638\u06cc\u0645\u0627\u062a \u0646\u0627\u062f\u0631\u0633\u062a (Misconfigurations) \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0644\u06cc\u0646\u0648\u06a9\u0633.<\/li>\n<li>\u06a9\u0627\u0631\u0628\u0631\u062f \u0645\u0648\u062b\u0631 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u062a\u062e\u0635\u0635\u06cc \u0628\u0631\u0627\u06cc \u062c\u0645\u0639\u200c\u0622\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0648 \u06cc\u0627\u0641\u062a\u0646 \u0628\u0631\u062f\u0627\u0631\u0647\u0627\u06cc \u062d\u0645\u0644\u0647.<\/li>\n<li>\u062a\u0633\u0644\u0637 \u0628\u0631 \u062a\u06a9\u0646\u06cc\u06a9\u200c\u0647\u0627\u06cc \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0645\u0628\u062a\u0646\u06cc \u0628\u0631 \u0647\u0633\u062a\u0647 (Kernel Exploits).<\/li>\n<li>\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0633\u06a9\u0631\u06cc\u067e\u062a\u200c\u0647\u0627 \u0648 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u062e\u0648\u062f\u06a9\u0627\u0631\u0633\u0627\u0632\u06cc \u0628\u0631\u0627\u06cc \u062a\u0633\u0631\u06cc\u0639 \u0641\u0631\u0622\u06cc\u0646\u062f \u0627\u0631\u062a\u0642\u0627\u0621.<\/li>\n<li>\u0622\u0634\u0646\u0627\u06cc\u06cc \u0628\u0627 \u0631\u0648\u0634\u200c\u0647\u0627\u06cc \u0631\u0627\u06cc\u062c \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u062f\u0631 \u0645\u062d\u06cc\u0637\u200c\u0647\u0627\u06cc Docker \u0648 Kubernetes.<\/li>\n<li>\u062f\u0631\u06a9 \u0639\u0645\u06cc\u0642 \u0627\u0632 \u0645\u06a9\u0627\u0646\u06cc\u0632\u0645\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0648 \u0631\u0627\u0647\u200c\u0647\u0627\u06cc \u062f\u0648\u0631 \u0632\u062f\u0646 \u0622\u0646\u200c\u0647\u0627.<\/li>\n<li>\u0627\u0646\u062c\u0627\u0645 \u0633\u0646\u0627\u0631\u06cc\u0648\u0647\u0627\u06cc \u0639\u0645\u0644\u06cc \u0628\u0631 \u0631\u0648\u06cc \u0645\u0627\u0634\u06cc\u0646\u200c\u0647\u0627\u06cc \u0645\u062c\u0627\u0632\u06cc \u0634\u0628\u06cc\u0647\u200c\u0633\u0627\u0632\u06cc \u0634\u062f\u0647 \u0627\u0632 \u0645\u062d\u06cc\u0637\u200c\u0647\u0627\u06cc \u0648\u0627\u0642\u0639\u06cc Hack The Box.<\/li>\n<li>\u06cc\u0627\u062f\u06af\u06cc\u0631\u06cc \u062a\u06a9\u0646\u06cc\u06a9\u200c\u0647\u0627\u06cc \u067e\u0633 \u0627\u0632 \u0627\u0631\u062a\u0642\u0627\u0621 (Post-Escalation) \u0628\u0631\u0627\u06cc \u062a\u062b\u0628\u06cc\u062a \u062f\u0633\u062a\u0631\u0633\u06cc \u0648 \u062d\u0631\u06a9\u062a \u062c\u0627\u0646\u0628\u06cc (Lateral Movement).<\/li>\n<\/ul>\n<\/div>\n<h2>\u0645\u062e\u0627\u0637\u0628\u0627\u0646 \u062f\u0648\u0631\u0647<\/h2>\n<div class='section-box'>\n<p>\u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u0622\u0645\u0648\u0632\u0634\u06cc \u0628\u0631\u0627\u06cc \u0627\u0641\u0631\u0627\u062f \u0632\u06cc\u0631 \u0628\u0633\u06cc\u0627\u0631 \u0645\u0641\u06cc\u062f \u062e\u0648\u0627\u0647\u062f \u0628\u0648\u062f:<\/p>\n<ul>\n<li>\u0645\u062a\u062e\u0635\u0635\u0627\u0646 \u0627\u0645\u0646\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0648 \u062a\u062d\u0644\u06cc\u0644\u06af\u0631\u0627\u0646 SOC.<\/li>\n<li>\u062a\u0633\u062a\u0631\u0627\u0646 \u0646\u0641\u0648\u0630 (Penetration Testers).<\/li>\n<li>\u0647\u06a9\u0631\u0647\u0627\u06cc \u0627\u062e\u0644\u0627\u0642\u06cc (Ethical Hackers).<\/li>\n<li>\u0645\u062f\u06cc\u0631\u0627\u0646 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0644\u06cc\u0646\u0648\u06a9\u0633 \u06a9\u0647 \u0628\u0647 \u062f\u0646\u0628\u0627\u0644 \u062a\u0642\u0648\u06cc\u062a \u062f\u0627\u0646\u0634 \u0627\u0645\u0646\u06cc\u062a\u06cc \u062e\u0648\u062f \u0647\u0633\u062a\u0646\u062f.<\/li>\n<li>\u062f\u0627\u0646\u0634\u062c\u0648\u06cc\u0627\u0646 \u0648 \u0639\u0644\u0627\u0642\u0647\u200c\u0645\u0646\u062f\u0627\u0646 \u0628\u0647 \u062d\u0648\u0632\u0647 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0648 \u062a\u0633\u062a \u0646\u0641\u0648\u0630.<\/li>\n<li>\u0627\u0641\u0631\u0627\u062f\u06cc \u06a9\u0647 \u0628\u0647 \u062f\u0646\u0628\u0627\u0644 \u0622\u0645\u0627\u062f\u06af\u06cc \u0628\u0631\u0627\u06cc \u06af\u0648\u0627\u0647\u06cc\u0646\u0627\u0645\u0647\u200c\u0647\u0627\u06cc \u0645\u0639\u062a\u0628\u0631 \u062f\u0631 \u0632\u0645\u06cc\u0646\u0647 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0647\u0633\u062a\u0646\u062f.<\/li>\n<\/ul>\n<\/div>\n<h2>\u067e\u06cc\u0634\u200c\u0646\u06cc\u0627\u0632\u0647\u0627\u06cc \u062f\u0648\u0631\u0647<\/h2>\n<div class='section-box'>\n<p>\u0628\u0631\u0627\u06cc \u0628\u0647\u0631\u0647\u200c\u0645\u0646\u062f\u06cc \u06a9\u0627\u0645\u0644 \u0627\u0632 \u0627\u06cc\u0646 \u062f\u0648\u0631\u0647\u060c \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f \u06a9\u0647 \u0641\u0631\u0627\u06af\u06cc\u0631\u0627\u0646 \u062f\u0627\u0646\u0634 \u0648 \u062a\u062c\u0631\u0628\u0647 \u0627\u0648\u0644\u06cc\u0647 \u062f\u0631 \u0632\u0645\u06cc\u0646\u0647\u200c\u0647\u0627\u06cc \u0632\u06cc\u0631 \u0631\u0627 \u062f\u0627\u0634\u062a\u0647 \u0628\u0627\u0634\u0646\u062f:<\/p>\n<ul>\n<li>\u0622\u0634\u0646\u0627\u06cc\u06cc \u0628\u0627 \u0645\u0641\u0627\u0647\u06cc\u0645 \u0627\u0648\u0644\u06cc\u0647 \u0633\u06cc\u0633\u062a\u0645 \u0639\u0627\u0645\u0644 \u0644\u06cc\u0646\u0648\u06a9\u0633\u060c \u062e\u0637 \u0641\u0631\u0645\u0627\u0646 (CLI) \u0648 \u062f\u0633\u062a\u0648\u0631\u0627\u062a \u067e\u0627\u06cc\u0647.<\/li>\n<li>\u062f\u0631\u06a9 \u06a9\u0644\u06cc \u0627\u0632 \u0645\u0641\u0627\u0647\u06cc\u0645 \u0634\u0628\u06a9\u0647\u200c\u0628\u0646\u062f\u06cc (Networking) \u0648 \u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627\u06cc \u0631\u0627\u06cc\u062c.<\/li>\n<li>\u0622\u0634\u0646\u0627\u06cc\u06cc \u0628\u0627 \u0645\u0641\u0627\u0647\u06cc\u0645 \u0627\u0648\u0644\u06cc\u0647 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc.<\/li>\n<li>\u062f\u0627\u0634\u062a\u0646 \u062f\u0627\u0646\u0634 \u067e\u0627\u06cc\u0647\u200c\u0627\u06cc \u062f\u0631 \u0632\u0645\u06cc\u0646\u0647 \u0632\u0628\u0627\u0646\u200c\u0647\u0627\u06cc \u0627\u0633\u06a9\u0631\u06cc\u067e\u062a\u200c\u0646\u0648\u06cc\u0633\u06cc \u0645\u0627\u0646\u0646\u062f Python \u06cc\u0627 Bash \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0633\u06cc\u0627\u0631 \u06a9\u0645\u06a9\u200c\u06a9\u0646\u0646\u062f\u0647 \u0628\u0627\u0634\u062f.<\/li>\n<\/ul>\n<p>\u0627\u0644\u0628\u062a\u0647\u060c \u062f\u0648\u0631\u0647 \u0628\u0647 \u06af\u0648\u0646\u0647\u200c\u0627\u06cc \u0637\u0631\u0627\u062d\u06cc \u0634\u062f\u0647 \u06a9\u0647 \u062d\u062a\u06cc \u0627\u06af\u0631 \u062f\u0627\u0646\u0634 \u0627\u0648\u0644\u06cc\u0647\u200c\u062a\u0627\u0646 \u062f\u0631 \u0628\u0631\u062e\u06cc \u0632\u0645\u06cc\u0646\u0647\u200c\u0647\u0627 \u0645\u062d\u062f\u0648\u062f \u0628\u0627\u0634\u062f\u060c \u0628\u0627 \u067e\u0634\u062a\u06a9\u0627\u0631 \u0648 \u062a\u0645\u0631\u06cc\u0646\u060c \u0642\u0627\u062f\u0631 \u0628\u0647 \u067e\u06cc\u0634\u0631\u0641\u062a \u062e\u0648\u0627\u0647\u06cc\u062f \u0628\u0648\u062f. \u0627\u06cc\u0646 \u0645\u062c\u0645\u0648\u0639\u0647 \u0622\u0645\u0648\u0632\u0634\u06cc\u060c \u067e\u0644 \u0627\u0631\u062a\u0628\u0627\u0637\u06cc \u0642\u0648\u06cc \u0628\u06cc\u0646 \u062f\u0627\u0646\u0634 \u067e\u0627\u06cc\u0647\u200c\u0627\u06cc \u0648 \u0645\u0647\u0627\u0631\u062a\u200c\u0647\u0627\u06cc \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0631\u0627 \u0628\u0631\u0627\u06cc \u0634\u0645\u0627 \u0641\u0631\u0627\u0647\u0645 \u0645\u06cc\u200c\u0622\u0648\u0631\u062f.<\/p>\n<\/div>\n<h2>\u0633\u0631\u0641\u0635\u0644\u200c\u0647\u0627\u06cc \u06a9\u0644\u06cc\u062f\u06cc \u062f\u0648\u0631\u0647<\/h2>\n<div class='section-box'>\n<p>\u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u0634\u0627\u0645\u0644 \u0628\u062e\u0634\u200c\u0647\u0627\u06cc \u0645\u062a\u0646\u0648\u0639 \u0648 \u06a9\u0627\u0631\u0628\u0631\u062f\u06cc \u0627\u0633\u062a \u06a9\u0647 \u0628\u0647 \u0635\u0648\u0631\u062a \u06af\u0627\u0645 \u0628\u0647 \u06af\u0627\u0645 \u0634\u0645\u0627 \u0631\u0627 \u0628\u0627 \u062f\u0646\u06cc\u0627\u06cc \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u062f\u0631 \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0622\u0634\u0646\u0627 \u0645\u06cc\u200c\u06a9\u0646\u062f:<\/p>\n<h3>\u0628\u062e\u0634 \u06f1: \u0645\u0628\u0627\u0646\u06cc \u0648 \u0645\u0639\u0631\u0641\u06cc<\/h3>\n<ul>\n<li>\u0645\u0639\u0631\u0641\u06cc \u062f\u0648\u0631\u0647 \u0648 \u0627\u0647\u062f\u0627\u0641 \u0622\u0645\u0648\u0632\u0634\u06cc.<\/li>\n<li>\u0645\u0631\u0648\u0631\u06cc \u0628\u0631 \u0645\u0641\u0627\u0647\u06cc\u0645 \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0648 \u0627\u0647\u0645\u06cc\u062a \u0622\u0646.<\/li>\n<li>\u0622\u0634\u0646\u0627\u06cc\u06cc \u0628\u0627 \u0633\u0627\u062e\u062a\u0627\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0639\u0627\u0645\u0644 \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0648 \u0646\u0642\u0634 \u06a9\u0627\u0631\u0628\u0631 root.<\/li>\n<li>\u0645\u0639\u0631\u0641\u06cc \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u0636\u0631\u0648\u0631\u06cc \u0628\u0631\u0627\u06cc \u0645\u0631\u0627\u062d\u0644 \u0627\u0648\u0644\u06cc\u0647 (Enumeration).<\/li>\n<\/ul>\n<h3>\u0628\u062e\u0634 \u06f2: \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0648 \u062c\u0645\u0639\u200c\u0622\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a (Enumeration)<\/h3>\n<ul>\n<li>\u062a\u06a9\u0646\u06cc\u06a9\u200c\u0647\u0627\u06cc \u062c\u0645\u0639\u200c\u0622\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u06a9\u0627\u0631\u0628\u0631\u0627\u0646\u060c \u06af\u0631\u0648\u0647\u200c\u0647\u0627 \u0648 \u062f\u0633\u062a\u0631\u0633\u06cc\u200c\u0647\u0627.<\/li>\n<li>\u0628\u0631\u0631\u0633\u06cc \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u0633\u06cc\u0633\u062a\u0645\u06cc\u060c \u0645\u062c\u0648\u0632\u0647\u0627 \u0648 \u0632\u0645\u0627\u0646\u200c\u0628\u0646\u062f\u06cc\u200c\u0647\u0627\u06cc Cron.<\/li>\n<li>\u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0633\u0631\u0648\u06cc\u0633\u200c\u0647\u0627 \u0648 \u067e\u0648\u0631\u062a\u200c\u0647\u0627\u06cc \u0628\u0627\u0632.<\/li>\n<li>\u06cc\u0627\u0641\u062a\u0646 \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc SUID\/SGID \u0648 \u0628\u0631\u0631\u0633\u06cc \u062a\u0646\u0638\u06cc\u0645\u0627\u062a \u0622\u0646\u200c\u0647\u0627.<\/li>\n<li>\u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631\u06cc \u0648 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0642\u062f\u06cc\u0645\u06cc.<\/li>\n<li><span class='highlight'>\u0645\u062b\u0627\u0644 \u0639\u0645\u0644\u06cc:<\/span> \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc\u06cc \u0645\u0627\u0646\u0646\u062f LinEnum.sh\u060c LinuxSmartEnumeration \u0648 ScoutSuite \u0628\u0631\u0627\u06cc \u062c\u0645\u0639\u200c\u0622\u0648\u0631\u06cc \u062c\u0627\u0645\u0639 \u0627\u0637\u0644\u0627\u0639\u0627\u062a.<\/li>\n<\/ul>\n<h3>\u0628\u062e\u0634 \u06f3: \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0627\u0632 \u0637\u0631\u06cc\u0642 \u062a\u0646\u0638\u06cc\u0645\u0627\u062a \u0646\u0627\u062f\u0631\u0633\u062a<\/h3>\n<ul>\n<li>\u0628\u0631\u0631\u0633\u06cc \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u067e\u06cc\u06a9\u0631\u0628\u0646\u062f\u06cc \u062d\u0633\u0627\u0633 (\u0645\u0627\u0646\u0646\u062f sudoers).<\/li>\n<li>\u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 Bash history \u0648 Job scheduling.<\/li>\n<li>\u0645\u062f\u06cc\u0631\u06cc\u062a \u0641\u0627\u06cc\u0644\u200c\u0647\u0627 \u0648 \u062f\u0627\u06cc\u0631\u06a9\u062a\u0648\u0631\u06cc\u200c\u0647\u0627\u06cc \u0628\u0627 \u062f\u0633\u062a\u0631\u0633\u06cc write.<\/li>\n<li>\u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0633\u0631\u0648\u06cc\u0633\u200c\u0647\u0627\u06cc \u062f\u0631 \u062d\u0627\u0644 \u0627\u062c\u0631\u0627 \u0628\u0627 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0627\u0644\u0627.<\/li>\n<li><span class='highlight'>\u0645\u062b\u0627\u0644 \u0639\u0645\u0644\u06cc:<\/span> \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u06cc\u06a9 \u0641\u0627\u06cc\u0644 sudoers \u0628\u0627 \u062a\u0646\u0638\u06cc\u0645\u0627\u062a \u0627\u0634\u062a\u0628\u0627\u0647 \u0628\u0631\u0627\u06cc \u0627\u062c\u0631\u0627\u06cc \u062f\u0633\u062a\u0648\u0631\u0627\u062a \u062f\u0644\u062e\u0648\u0627\u0647 \u0628\u0627 \u062f\u0633\u062a\u0631\u0633\u06cc root.<\/li>\n<\/ul>\n<h3>\u0628\u062e\u0634 \u06f4: \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc \u0647\u0633\u062a\u0647 (Kernel Exploits)<\/h3>\n<ul>\n<li>\u0645\u0641\u0647\u0648\u0645 Kernel Exploits \u0648 \u0627\u0646\u0648\u0627\u0639 \u0622\u0646\u200c\u0647\u0627.<\/li>\n<li>\u0631\u0648\u0634\u200c\u0647\u0627\u06cc \u06cc\u0627\u0641\u062a\u0646 Kernel Exploits \u0645\u0646\u0627\u0633\u0628 \u0628\u0631 \u0627\u0633\u0627\u0633 \u0646\u0633\u062e\u0647 \u0647\u0633\u062a\u0647.<\/li>\n<li>\u06a9\u0627\u0645\u067e\u0627\u06cc\u0644 \u0648 \u0627\u062c\u0631\u0627\u06cc Kernel Exploits.<\/li>\n<li><span class='highlight'>\u0645\u062b\u0627\u0644 \u0639\u0645\u0644\u06cc:<\/span> \u0627\u062c\u0631\u0627\u06cc \u06cc\u06a9 Kernel Exploit \u0645\u0639\u0631\u0648\u0641 \u0628\u0631\u0627\u06cc \u062f\u0633\u062a\u06cc\u0627\u0628\u06cc \u0628\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc root \u062f\u0631 \u06cc\u06a9 \u0633\u06cc\u0633\u062a\u0645 \u0642\u062f\u06cc\u0645\u06cc.<\/li>\n<\/ul>\n<h3>\u0628\u062e\u0634 \u06f5: \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0628\u0627\u06cc\u0646\u0631\u06cc\u200c\u0647\u0627\u06cc SUID\/SGID<\/h3>\n<ul>\n<li>\u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0648 \u062a\u062d\u0644\u06cc\u0644 \u0628\u0627\u06cc\u0646\u0631\u06cc\u200c\u0647\u0627\u06cc SUID\/SGID.<\/li>\n<li>\u062a\u06a9\u0646\u06cc\u06a9\u200c\u0647\u0627\u06cc \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0628\u0627\u06cc\u0646\u0631\u06cc\u200c\u0647\u0627\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f (\u0645\u0627\u0646\u0646\u062f find, nmap, bash).<\/li>\n<li>\u0633\u0627\u062e\u062a \u0628\u0627\u06cc\u0646\u0631\u06cc\u200c\u0647\u0627\u06cc SUID \u0633\u0641\u0627\u0631\u0634\u06cc.<\/li>\n<li><span class='highlight'>\u0645\u062b\u0627\u0644 \u0639\u0645\u0644\u06cc:<\/span> \u0627\u062c\u0631\u0627\u06cc \u06cc\u06a9 \u062f\u0633\u062a\u0648\u0631 \u0628\u0627 \u062f\u0633\u062a\u0631\u0633\u06cc root \u0627\u0632 \u0637\u0631\u06cc\u0642 \u06cc\u06a9 \u0641\u0627\u06cc\u0644 \u0627\u062c\u0631\u0627\u06cc\u06cc SUID \u06a9\u0647 \u0628\u0647 \u0627\u0634\u062a\u0628\u0627\u0647 \u067e\u06cc\u06a9\u0631\u0628\u0646\u062f\u06cc \u0634\u062f\u0647 \u0627\u0633\u062a.<\/li>\n<\/ul>\n<h3>\u0628\u062e\u0634 \u06f6: \u062a\u06a9\u0646\u06cc\u06a9\u200c\u0647\u0627\u06cc \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0648 \u0633\u0646\u0627\u0631\u06cc\u0648\u0647\u0627\u06cc \u062e\u0627\u0635<\/h3>\n<ul>\n<li>\u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u062f\u0631 \u0645\u062d\u06cc\u0637\u200c\u0647\u0627\u06cc Docker \u0648 Containerization.<\/li>\n<li>\u062a\u06a9\u0646\u06cc\u06a9\u200c\u0647\u0627\u06cc \u0627\u0631\u062a\u0642\u0627\u0621 \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0628\u0627 SELinux \u06cc\u0627 AppArmor \u0641\u0639\u0627\u0644.<\/li>\n<li>\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0628\u0632\u0627\u0631 GTFOBins \u0628\u0631\u0627\u06cc \u06cc\u0627\u0641\u062a\u0646 \u0628\u0631\u062f\u0627\u0631\u0647\u0627\u06cc \u062d\u0645\u0644\u0647.<\/li>\n<li>\u062a\u06a9\u0646\u06cc\u06a9\u200c\u0647\u0627\u06cc password cracking \u0648 credential harvesting.<\/li>\n<li><span class='highlight'>\u0645\u062b\u0627\u0644 \u0639\u0645\u0644\u06cc:<\/span> \u0627\u0646\u062c\u0627\u0645 \u062d\u0645\u0644\u0627\u062a \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u062f\u0631 \u06cc\u06a9 \u0645\u062d\u06cc\u0637 Dockerfile \u0622\u0644\u0648\u062f\u0647.<\/li>\n<\/ul>\n<h3>\u0628\u062e\u0634 \u06f7: \u0627\u0642\u062f\u0627\u0645\u0627\u062a \u067e\u0633 \u0627\u0632 \u0627\u0631\u062a\u0642\u0627\u0621 (Post-Escalation)<\/h3>\n<ul>\n<li>\u062a\u062b\u0628\u06cc\u062a \u062f\u0633\u062a\u0631\u0633\u06cc (Persistence) \u0648 \u0627\u06cc\u062c\u0627\u062f \u062f\u0633\u062a\u0631\u0633\u06cc \u067e\u0634\u062a\u06cc\u0628\u0627\u0646.<\/li>\n<li>\u062d\u0631\u06a9\u062a \u062c\u0627\u0646\u0628\u06cc (Lateral Movement) \u062f\u0631 \u0634\u0628\u06a9\u0647.<\/li>\n<li>\u062c\u0645\u0639\u200c\u0622\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062d\u0633\u0627\u0633 \u067e\u0633 \u0627\u0632 \u062f\u0633\u062a\u06cc\u0627\u0628\u06cc \u0628\u0647 root.<\/li>\n<li>\u067e\u0627\u06a9\u0633\u0627\u0632\u06cc \u0631\u062f\u067e\u0627\u0647\u0627.<\/li>\n<\/ul>\n<h3>\u0628\u062e\u0634 \u06f8: \u067e\u0631\u0648\u0698\u0647\u200c\u0647\u0627\u06cc \u0639\u0645\u0644\u06cc \u0648 \u062a\u0645\u0631\u06cc\u0646<\/h3>\n<ul>\n<li>\u0627\u0646\u062c\u0627\u0645 \u0633\u0646\u0627\u0631\u06cc\u0648\u0647\u0627\u06cc \u0686\u0627\u0644\u0634\u200c\u0628\u0631\u0627\u0646\u06af\u06cc\u0632 \u062f\u0631 \u0645\u062d\u06cc\u0637 Hack The Box.<\/li>\n<li>\u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc \u062a\u06a9\u0646\u06cc\u06a9\u200c\u0647\u0627\u06cc \u0622\u0645\u0648\u062e\u062a\u0647 \u0634\u062f\u0647 \u062f\u0631 \u0645\u0627\u0634\u06cc\u0646\u200c\u0647\u0627\u06cc \u0645\u062c\u0627\u0632\u06cc \u0637\u0631\u0627\u062d\u06cc \u0634\u062f\u0647.<\/li>\n<li>\u0628\u0631\u0631\u0633\u06cc \u0631\u0627\u0647\u200c\u062d\u0644\u200c\u0647\u0627 \u0648 \u0628\u0627\u0632\u062e\u0648\u0631\u062f \u062f\u0631 \u0645\u0648\u0631\u062f \u062a\u0645\u0631\u06cc\u0646\u200c\u0647\u0627.<\/li>\n<\/ul>\n<\/div>\n<h2>\u0645\u0632\u0627\u06cc\u0627\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0641\u0644\u0634 \u0645\u0645\u0648\u0631\u06cc 32GB<\/h2>\n<div class='section-box'>\n<p>\u0627\u0631\u0627\u0626\u0647 \u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u0628\u0631 \u0631\u0648\u06cc \u0641\u0644\u0634 \u0645\u0645\u0648\u0631\u06cc 32 \u06af\u06cc\u06af\u0627\u0628\u0627\u06cc\u062a\u06cc \u0645\u0632\u0627\u06cc\u0627\u06cc \u0642\u0627\u0628\u0644 \u062a\u0648\u062c\u0647\u06cc \u062f\u0627\u0631\u062f:<\/p>\n<ul>\n<li><strong>\u062f\u0633\u062a\u0631\u0633\u06cc \u0633\u0631\u06cc\u0639 \u0648 \u0622\u0641\u0644\u0627\u06cc\u0646:<\/strong> \u0634\u0645\u0627 \u0646\u06cc\u0627\u0632\u06cc \u0628\u0647 \u062f\u0627\u0646\u0644\u0648\u062f \u062d\u062c\u0645 \u0632\u06cc\u0627\u062f\u06cc \u0627\u0632 \u062f\u0627\u062f\u0647\u200c\u0647\u0627 \u0646\u062f\u0627\u0631\u06cc\u062f \u0648 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u06cc\u062f \u062f\u0631 \u0647\u0631 \u0632\u0645\u0627\u0646 \u0648 \u0645\u06a9\u0627\u0646\u06cc \u0628\u0647 \u0645\u062d\u062a\u0648\u0627\u06cc \u062f\u0648\u0631\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc \u062f\u0627\u0634\u062a\u0647 \u0628\u0627\u0634\u06cc\u062f.<\/li>\n<li><strong>\u062a\u0645\u0627\u0645 \u0645\u062d\u062a\u0648\u0627\u06cc \u0622\u0645\u0648\u0632\u0634\u06cc:<\/strong> \u0634\u0627\u0645\u0644 \u0648\u06cc\u062f\u0626\u0648\u0647\u0627\u06cc \u0622\u0645\u0648\u0632\u0634\u06cc \u0628\u0627 \u06a9\u06cc\u0641\u06cc\u062a\u060c \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc PDF\u060c \u0627\u0633\u06a9\u0631\u06cc\u067e\u062a\u200c\u0647\u0627\u060c \u0645\u0627\u0634\u06cc\u0646\u200c\u0647\u0627\u06cc \u0645\u062c\u0627\u0632\u06cc \u0648 \u0633\u0627\u06cc\u0631 \u0645\u0646\u0627\u0628\u0639 \u0645\u0648\u0631\u062f \u0646\u06cc\u0627\u0632.<\/li>\n<li><strong>\u06a9\u06cc\u0641\u06cc\u062a \u062a\u0636\u0645\u06cc\u0646 \u0634\u062f\u0647:<\/strong> \u0627\u0637\u0645\u06cc\u0646\u0627\u0646 \u0627\u0632 \u0639\u062f\u0645 \u0627\u0641\u062a \u06a9\u06cc\u0641\u06cc\u062a \u062f\u0631 \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u0635\u0648\u062a\u06cc \u0648 \u062a\u0635\u0648\u06cc\u0631\u06cc \u0628\u0647 \u062f\u0644\u06cc\u0644 \u062f\u0627\u0646\u0644\u0648\u062f \u06cc\u0627 \u0627\u0633\u062a\u0631\u06cc\u0645.<\/li>\n<li><strong>\u0642\u0627\u0628\u0644 \u062d\u0645\u0644 \u0628\u0648\u062f\u0646:<\/strong> \u0628\u0647 \u0631\u0627\u062d\u062a\u06cc \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u06cc\u062f \u0641\u0644\u0634 \u0645\u0645\u0648\u0631\u06cc \u0631\u0627 \u062d\u0645\u0644 \u06a9\u0631\u062f\u0647 \u0648 \u0628\u0631 \u0631\u0648\u06cc \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0645\u062e\u062a\u0644\u0641 \u0645\u0648\u0631\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0642\u0631\u0627\u0631 \u062f\u0647\u06cc\u062f.<\/li>\n<\/ul>\n<\/div>\n<h2>\u0686\u0631\u0627 \u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u0631\u0627 \u0627\u0646\u062a\u062e\u0627\u0628 \u06a9\u0646\u06cc\u062f\u061f<\/h2>\n<div class='section-box'>\n<p>\u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u0622\u0645\u0648\u0632\u0634\u06cc\u060c \u062a\u0631\u06a9\u06cc\u0628\u06cc \u0628\u06cc\u200c\u0646\u0638\u06cc\u0631 \u0627\u0632 \u062f\u0627\u0646\u0634 \u062a\u0626\u0648\u0631\u06cc \u0648 \u0645\u0647\u0627\u0631\u062a\u200c\u0647\u0627\u06cc \u0639\u0645\u0644\u06cc \u0627\u0633\u062a \u06a9\u0647 \u062a\u0648\u0633\u0637 \u0645\u062a\u062e\u0635\u0635\u0627\u0646 \u0628\u0631\u062c\u0633\u062a\u0647 \u062d\u0648\u0632\u0647 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc\u060c \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0633\u0646\u0627\u0631\u06cc\u0648\u0647\u0627\u06cc \u0648\u0627\u0642\u0639\u06cc \u0648 \u0686\u0627\u0644\u0634\u200c\u0647\u0627\u06cc \u062c\u0630\u0627\u0628 Hack The Box \u0627\u0631\u0627\u0626\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a. \u0634\u0645\u0627 \u0628\u0627 \u0635\u0631\u0641 \u0632\u0645\u0627\u0646 \u0628\u0631 \u0631\u0648\u06cc \u0627\u06cc\u0646 \u0645\u062c\u0645\u0648\u0639\u0647\u060c \u0633\u0631\u0645\u0627\u06cc\u0647\u200c\u06af\u0630\u0627\u0631\u06cc \u0627\u0631\u0632\u0634\u0645\u0646\u062f\u06cc \u0628\u0631 \u0631\u0648\u06cc \u062f\u0627\u0646\u0634 \u0648 \u0622\u06cc\u0646\u062f\u0647 \u0634\u063a\u0644\u06cc \u062e\u0648\u062f \u0627\u0646\u062c\u0627\u0645 \u062e\u0648\u0627\u0647\u06cc\u062f \u062f\u0627\u062f. \u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u0628\u0647 \u0634\u0645\u0627 \u0627\u0645\u06a9\u0627\u0646 \u0645\u06cc\u200c\u062f\u0647\u062f \u062a\u0627 \u0628\u0627 \u0627\u0639\u062a\u0645\u0627\u062f \u0628\u0647 \u0646\u0641\u0633 \u0628\u06cc\u0634\u062a\u0631\u06cc \u062f\u0631 \u0645\u062d\u06cc\u0637\u200c\u0647\u0627\u06cc \u0648\u0627\u0642\u0639\u06cc \u062a\u0633\u062a \u0646\u0641\u0648\u0630 \u0648 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0639\u0645\u0644 \u06a9\u0646\u06cc\u062f \u0648 \u062f\u0631\u06a9 \u0639\u0645\u06cc\u0642\u200c\u062a\u0631\u06cc \u0627\u0632 \u0631\u0648\u0634\u200c\u0647\u0627\u06cc \u062f\u0641\u0627\u0639 \u0648 \u062d\u0645\u0644\u0647 \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0628\u0647 \u062f\u0633\u062a \u0622\u0648\u0631\u06cc\u062f.<\/p>\n<p>\u0628\u0627 \u06cc\u0627\u062f\u06af\u06cc\u0631\u06cc \u0627\u06cc\u0646 \u062a\u06a9\u0646\u06cc\u06a9\u200c\u0647\u0627\u06cc \u067e\u06cc\u0634\u0631\u0641\u062a\u0647\u060c \u0646\u0647 \u062a\u0646\u0647\u0627 \u0645\u0647\u0627\u0631\u062a\u200c\u0647\u0627\u06cc \u0641\u0631\u062f\u06cc \u062e\u0648\u062f \u0631\u0627 \u0627\u0631\u062a\u0642\u0627 \u0645\u06cc\u200c\u062f\u0647\u06cc\u062f\u060c \u0628\u0644\u06a9\u0647 \u0628\u0647 \u0627\u0628\u0632\u0627\u0631\u06cc \u0642\u062f\u0631\u062a\u0645\u0646\u062f \u0628\u0631\u0627\u06cc \u0645\u062d\u0627\u0641\u0638\u062a \u0627\u0632 \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627 \u062f\u0631 \u0628\u0631\u0627\u0628\u0631 \u062a\u0647\u062f\u06cc\u062f\u0627\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0645\u062c\u0647\u0632 \u0645\u06cc\u200c\u0634\u0648\u06cc\u062f. \u0627\u06cc\u0646 \u0645\u062c\u0645\u0648\u0639\u0647 \u0622\u0645\u0648\u0632\u0634\u06cc\u060c \u06af\u0627\u0645\u06cc \u0628\u0644\u0646\u062f \u062f\u0631 \u062c\u0647\u062a \u062a\u0628\u062f\u06cc\u0644 \u0634\u062f\u0646 \u0634\u0645\u0627 \u0628\u0647 \u06cc\u06a9 \u0645\u062a\u062e\u0635\u0635 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062d\u0631\u0641\u0647\u200c\u0627\u06cc \u0648 \u06a9\u0627\u0631\u0622\u0645\u062f \u0627\u0633\u062a.<\/p>\n<\/div>\n<\/article>\n","protected":false},"excerpt":{"rendered":"<p>\u0646\u0627\u0645 \u0645\u062d\u0635\u0648\u0644 \u0628\u0647 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc Udemy &#8211; Advanced Linux Privilege Escalation with Hack The Box 2022-11 &#8211; \u0646\u0627\u0645 \u0645\u062d\u0635\u0648\u0644 \u0628\u0647 \u0641\u0627\u0631\u0633\u06cc [&hellip;]<\/p>\n","protected":false},"featured_media":113382,"comment_status":"open","ping_status":"closed","template":"","meta":{"pmpro_default_level":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}}},"product_cat":[1225],"product_tag":[99468,50768,79375,123370,8422,123363,123384,123462,123437,123424,123334,123474,123486,123499,123402,123525,123616,123577,123564,123603,123538,123590,123629,123551,123512,123414,123450,34898,72543,123391,59473,50771,630,28429,72298,123338,123355,123408,123493,123456,123419,123545,123571,123623,123610,123532,123584,123431,123597,123558,123506,123444,123519,123469,123480,123397,123353,99007,70986,32083,100867,123388,79451,123381,123348,79455,119200,87593,123471,123399,123434,123561,123613,123548,123600,123626,123574,123522,123587,123509,123535,123483,123411,123496,123447,123421,123459,4963,79450,57088,1729,5591,50770,79376,50767,123349,123361,123368,123472,123435,123400,123448,123460,123422,123523,123588,123627,123497,123549,123575,123601,123510,123562,123614,123536,123412,123484,123356,123339,123382,123389,123345,123373,123378,123366,123360,123337,123342,103375,123467,123406,123429,123395,123491,123418,123442,123504,123454,123530,123595,123608,123621,123569,123543,123517,123556,123582,123478,123386,58107,123347,54731,28415,123335,1735,123341,27436,79417,52962,37102,1751,25752,71800,41898,64144,123445,123457,123409,123432,97800,97793,123533,123520,123559,123572,97811,123507,123611,123481,123546,123585,123598,123624,123494,40209,97789,28146,2765,4299,5849,63122,80220,41970,123343,123351,26444,123375,13508,123354,123336,123392,8423,123344,123403,45487,123451,123578,123617,123475,123487,123526,123552,123591,123500,123539,123513,123463,123565,123425,123604,123387,123438,123367,123458,123372,123420,123398,123470,123380,123433,123410,123415,87351,123446,123482,123573,123495,123586,123534,123560,123612,123521,123508,123599,123625,123547,42099,1397,98715,1714,62383,32848,82918,1730,123393,123364,123352,123358,119291,123376,77885,123427,123440,123404,123606,123541,123567,123554,123593,123489,123416,123465,123476,123515,123580,123619,123528,123502,123453,123385,32845,50766,123383,123436,123374,123473,123485,123449,123602,123589,123628,123511,123550,123563,123615,123576,123537,123498,123524,123423,123390,123346,123350,123461,123413,123362,123340,123401,123369,123357,40777,63691,120428,12575,77886,90593,66137,120024,79427,9845,94771,120008,81356,8476,90877,119283,123426,123439,100805,123452,123527,123566,123540,123579,123592,123605,123618,123553,123464,123514,123488,100832,123501,65342,14789,3867,100896,123430,123443,123479,123455,123407,123468,123396,123557,123570,123596,123609,123622,123583,123505,123531,123544,123518,123492,123379,11268,79397,68263,17679,1732,3399,4298,59548,49724,1243,1128,37987,4980,123477,123490,123503,123428,123466,123441,123417,123405,123555,123529,123568,123542,123581,123516,123594,123607,123620,89824,123365,13560,25750,123394,123377,123371,123359,16812],"class_list":{"0":"post-122705","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-1225","7":"product_tag-advanced-cybersecurity","8":"product_tag-advanced-hacking","9":"product_tag-advanced-hacking-techniques","10":"product_tag-advanced-it-security","11":"product_tag-advanced-linux","12":"product_tag-advanced-linux-administration","13":"product_tag-advanced-linux-exploitation","14":"product_tag-advanced-linux-exploitation-techniques","15":"product_tag-advanced-linux-hacking","16":"product_tag-advanced-linux-penetration-testing","17":"product_tag-advanced-linux-privilege-escalation","18":"product_tag-advanced-linux-security-auditing","19":"product_tag-advanced-linux-security-auditing-tools","20":"product_tag-advanced-linux-security-policies","21":"product_tag-advanced-linux-security-practices","22":"product_tag-advanced-linux-security-practices-for-cloud","23":"product_tag-advanced-linux-security-practices-for-critical-infrastructure","24":"product_tag-advanced-linux-security-practices-for-firmware","25":"product_tag-advanced-linux-security-practices-for-ics-systems","26":"product_tag-advanced-linux-security-practices-for-industrial-control-systems","27":"product_tag-advanced-linux-security-practices-for-mobile-devices","28":"product_tag-advanced-linux-security-practices-for-plc-systems","29":"product_tag-advanced-linux-security-practices-for-scada-and-ics-systems","30":"product_tag-advanced-linux-security-practices-for-scada-systems","31":"product_tag-advanced-linux-security-practices-for-servers","32":"product_tag-advanced-linux-system-hardening","33":"product_tag-advanced-linux-vulnerability-analysis","34":"product_tag-advanced-penetration-testing","35":"product_tag-advanced-security","36":"product_tag-advanced-security-tools","37":"product_tag-capture-the-flag","38":"product_tag-ctf","39":"product_tag-cybersecurity","40":"product_tag-cybersecurity-analyst","41":"product_tag-cybersecurity-awareness","42":"product_tag-cybersecurity-career","43":"product_tag-cybersecurity-certifications","44":"product_tag-cybersecurity-certifications-and-exams","45":"product_tag-cybersecurity-certifications-eligibility","46":"product_tag-cybersecurity-certifications-explained","47":"product_tag-cybersecurity-certifications-for-beginners","48":"product_tag-cybersecurity-certifications-for-beginners-and-advanced-learners","49":"product_tag-cybersecurity-certifications-for-entry-level-professionals","50":"product_tag-cybersecurity-certifications-for-it-directors","51":"product_tag-cybersecurity-certifications-for-it-managers","52":"product_tag-cybersecurity-certifications-for-it-professionals","53":"product_tag-cybersecurity-certifications-for-mid-level-professionals","54":"product_tag-cybersecurity-certifications-for-professionals","55":"product_tag-cybersecurity-certifications-for-senior-level-professionals","56":"product_tag-cybersecurity-certifications-for-students-and-graduates","57":"product_tag-cybersecurity-certifications-guide","58":"product_tag-cybersecurity-certifications-online","59":"product_tag-cybersecurity-certifications-overview","60":"product_tag-cybersecurity-certifications-path","61":"product_tag-cybersecurity-certifications-requirements","62":"product_tag-cybersecurity-certifications-training","63":"product_tag-cybersecurity-consultant","64":"product_tag-cybersecurity-education","65":"product_tag-cybersecurity-forensics","66":"product_tag-cybersecurity-fundamentals","67":"product_tag-cybersecurity-governance","68":"product_tag-cybersecurity-governance-risk-and-compliance","69":"product_tag-cybersecurity-industry","70":"product_tag-cybersecurity-leadership","71":"product_tag-cybersecurity-manager","72":"product_tag-cybersecurity-professionals","73":"product_tag-cybersecurity-specialist","74":"product_tag-cybersecurity-strategy","75":"product_tag-cybersecurity-strategy-consulting","76":"product_tag-cybersecurity-strategy-development","77":"product_tag-cybersecurity-strategy-execution","78":"product_tag-cybersecurity-strategy-execution-blueprint","79":"product_tag-cybersecurity-strategy-execution-blueprint-and-plan","80":"product_tag-cybersecurity-strategy-execution-framework","81":"product_tag-cybersecurity-strategy-execution-framework-and-plan","82":"product_tag-cybersecurity-strategy-execution-framework-and-plan-and-blueprint","83":"product_tag-cybersecurity-strategy-execution-plan","84":"product_tag-cybersecurity-strategy-execution-process","85":"product_tag-cybersecurity-strategy-execution-process-and-plan","86":"product_tag-cybersecurity-strategy-execution-steps","87":"product_tag-cybersecurity-strategy-execution-strategy","88":"product_tag-cybersecurity-strategy-formulation","89":"product_tag-cybersecurity-strategy-implementation","90":"product_tag-cybersecurity-strategy-implementation-plan","91":"product_tag-cybersecurity-strategy-planning","92":"product_tag-cybersecurity-strategy-review","93":"product_tag-cybersecurity-strategy-updates","94":"product_tag-cybersecurity-training","95":"product_tag-cybersecurity-trends","96":"product_tag-defensive-security","97":"product_tag-ethical-hacking","98":"product_tag-ethical-hacking-training","99":"product_tag-exploitation","100":"product_tag-exploitation-techniques","101":"product_tag-hack-the-box","102":"product_tag-hack-the-box-academy","103":"product_tag-hack-the-box-challenges","104":"product_tag-hack-the-box-community","105":"product_tag-hack-the-box-community-articles","106":"product_tag-hack-the-box-community-discussions","107":"product_tag-hack-the-box-community-forum","108":"product_tag-hack-the-box-community-guides","109":"product_tag-hack-the-box-community-help","110":"product_tag-hack-the-box-community-resources","111":"product_tag-hack-the-box-community-resources-and-articles","112":"product_tag-hack-the-box-community-resources-and-articles-and-tutorials","113":"product_tag-hack-the-box-community-resources-and-articles-and-tutorials-and-guides","114":"product_tag-hack-the-box-community-resources-and-guides","115":"product_tag-hack-the-box-community-resources-and-guides-and-articles","116":"product_tag-hack-the-box-community-resources-and-guides-and-tutorials","117":"product_tag-hack-the-box-community-resources-and-guides-and-tutorials-and-articles","118":"product_tag-hack-the-box-community-resources-and-tutorials","119":"product_tag-hack-the-box-community-resources-and-tutorials-and-articles","120":"product_tag-hack-the-box-community-resources-and-tutorials-and-guides-and-articles","121":"product_tag-hack-the-box-community-resources-and-videos","122":"product_tag-hack-the-box-community-support","123":"product_tag-hack-the-box-community-videos","124":"product_tag-hack-the-box-labs","125":"product_tag-hack-the-box-machines","126":"product_tag-hack-the-box-platforms","127":"product_tag-hack-the-box-practice","128":"product_tag-hack-the-box-walkthrough","129":"product_tag-hack-the-box-walkthroughs","130":"product_tag-hacking-awareness","131":"product_tag-hacking-countermeasures","132":"product_tag-hacking-defense","133":"product_tag-hacking-lab","134":"product_tag-hacking-methods","135":"product_tag-hacking-prevention","136":"product_tag-hacking-prevention-best-practices","137":"product_tag-hacking-prevention-measures","138":"product_tag-hacking-prevention-software","139":"product_tag-hacking-prevention-strategies","140":"product_tag-hacking-prevention-strategies-and-tools","141":"product_tag-hacking-prevention-systems","142":"product_tag-hacking-prevention-techniques","143":"product_tag-hacking-prevention-techniques-and-tools","144":"product_tag-hacking-prevention-tools","145":"product_tag-hacking-prevention-tools-and-software","146":"product_tag-hacking-prevention-tools-and-software-and-training","147":"product_tag-hacking-prevention-tools-and-software-and-training-programs","148":"product_tag-hacking-prevention-tools-and-software-and-training-programs-and-techniques","149":"product_tag-hacking-prevention-tools-and-software-training","150":"product_tag-hacking-prevention-tools-and-techniques","151":"product_tag-hacking-prevention-tools-and-technologies","152":"product_tag-hacking-prevention-tools-and-training","153":"product_tag-hacking-prevention-tools-and-training-programs","154":"product_tag-hacking-prevention-training-programs","155":"product_tag-hacking-simulations","156":"product_tag-hacking-skills","157":"product_tag-hacking-strategies","158":"product_tag-hacking-techniques","159":"product_tag-hacking-tools","160":"product_tag-hackthebox","161":"product_tag-information-security","162":"product_tag-information-security-professional","163":"product_tag-it-certification","164":"product_tag-it-consulting","165":"product_tag-it-infrastructure","166":"product_tag-it-management","167":"product_tag-it-networking","168":"product_tag-it-security","169":"product_tag-it-services","170":"product_tag-it-skills","171":"product_tag-it-solutions","172":"product_tag-it-solutions-and-consulting","173":"product_tag-it-solutions-and-management","174":"product_tag-it-solutions-and-services","175":"product_tag-it-solutions-and-support","176":"product_tag-it-solutions-company","177":"product_tag-it-solutions-provider","178":"product_tag-it-solutions-provider-africa","179":"product_tag-it-solutions-provider-asia","180":"product_tag-it-solutions-provider-australia","181":"product_tag-it-solutions-provider-canada","182":"product_tag-it-solutions-provider-company","183":"product_tag-it-solutions-provider-europe","184":"product_tag-it-solutions-provider-hong-kong","185":"product_tag-it-solutions-provider-india","186":"product_tag-it-solutions-provider-middle-east","187":"product_tag-it-solutions-provider-new-zealand","188":"product_tag-it-solutions-provider-singapore","189":"product_tag-it-solutions-provider-south-korea","190":"product_tag-it-solutions-provider-usa","191":"product_tag-it-support","192":"product_tag-it-support-services","193":"product_tag-it-training","194":"product_tag-linux-administration","195":"product_tag-linux-command-line","196":"product_tag-linux-commands","197":"product_tag-linux-exploitation","198":"product_tag-linux-firewall","199":"product_tag-linux-hacking","200":"product_tag-linux-hacking-techniques","201":"product_tag-linux-kernel-exploitation","202":"product_tag-linux-mastery","203":"product_tag-linux-network-security","204":"product_tag-linux-networking","205":"product_tag-linux-performance-tuning","206":"product_tag-linux-privesc","207":"product_tag-linux-privilege","208":"product_tag-linux-security","209":"product_tag-linux-security-audit","210":"product_tag-linux-security-auditing-tools","211":"product_tag-linux-security-best-practices","212":"product_tag-linux-security-best-practices-for-applications","213":"product_tag-linux-security-best-practices-for-applications-and-databases","214":"product_tag-linux-security-best-practices-for-applications-and-networks","215":"product_tag-linux-security-best-practices-for-cloud","216":"product_tag-linux-security-best-practices-for-databases","217":"product_tag-linux-security-best-practices-for-databases-and-applications","218":"product_tag-linux-security-best-practices-for-databases-and-networks","219":"product_tag-linux-security-best-practices-for-databases-and-servers","220":"product_tag-linux-security-best-practices-for-development","221":"product_tag-linux-security-best-practices-for-development-and-operations","222":"product_tag-linux-security-best-practices-for-mobile-devices","223":"product_tag-linux-security-best-practices-for-networks","224":"product_tag-linux-security-best-practices-for-networks-and-applications","225":"product_tag-linux-security-best-practices-for-servers","226":"product_tag-linux-security-best-practices-for-servers-and-applications","227":"product_tag-linux-security-best-practices-training","228":"product_tag-linux-security-configurations","229":"product_tag-linux-security-hardening","230":"product_tag-linux-security-hardening-techniques","231":"product_tag-linux-security-monitoring","232":"product_tag-linux-security-monitoring-and-alerting","233":"product_tag-linux-security-monitoring-tools","234":"product_tag-linux-security-patch-management","235":"product_tag-linux-security-patching","236":"product_tag-linux-security-patching-best-practices","237":"product_tag-linux-security-patching-tools","238":"product_tag-linux-security-policies","239":"product_tag-linux-security-tools","240":"product_tag-linux-security-vulnerabilities","241":"product_tag-linux-security-vulnerability-assessment","242":"product_tag-linux-security-vulnerability-assessment-tools","243":"product_tag-linux-security-vulnerability-management","244":"product_tag-linux-security-vulnerability-management-best-practices","245":"product_tag-linux-security-vulnerability-management-tools","246":"product_tag-linux-security-vulnerability-patch-management","247":"product_tag-linux-security-vulnerability-patch-management-best-practices","248":"product_tag-linux-security-vulnerability-patching","249":"product_tag-linux-security-vulnerability-scanning","250":"product_tag-linux-security-vulnerability-scanning-best-practices","251":"product_tag-linux-security-vulnerability-scanning-best-practices-and-tools","252":"product_tag-linux-security-vulnerability-scanning-tools","253":"product_tag-linux-server","254":"product_tag-linux-system-administration","255":"product_tag-network-pentesting","256":"product_tag-network-security","257":"product_tag-network-vulnerabilities","258":"product_tag-offensive-security","259":"product_tag-penetration-tester","260":"product_tag-penetration-testing","261":"product_tag-penetration-testing-best-practices","262":"product_tag-penetration-testing-frameworks","263":"product_tag-penetration-testing-methodology","264":"product_tag-penetration-testing-reports","265":"product_tag-penetration-testing-services","266":"product_tag-penetration-testing-techniques","267":"product_tag-penetration-testing-tools","268":"product_tag-penetration-testing-tools-and-methodologies","269":"product_tag-penetration-testing-tools-and-resources","270":"product_tag-penetration-testing-tools-and-techniques","271":"product_tag-penetration-testing-tools-for-critical-infrastructure","272":"product_tag-penetration-testing-tools-for-embedded-systems","273":"product_tag-penetration-testing-tools-for-firmware","274":"product_tag-penetration-testing-tools-for-ics-systems","275":"product_tag-penetration-testing-tools-for-industrial-control-systems","276":"product_tag-penetration-testing-tools-for-iot","277":"product_tag-penetration-testing-tools-for-linux","278":"product_tag-penetration-testing-tools-for-macos","279":"product_tag-penetration-testing-tools-for-mobile","280":"product_tag-penetration-testing-tools-for-network-devices","281":"product_tag-penetration-testing-tools-for-plc-systems","282":"product_tag-penetration-testing-tools-for-scada-and-ics-systems","283":"product_tag-penetration-testing-tools-for-scada-systems","284":"product_tag-penetration-testing-tools-for-web-applications","285":"product_tag-penetration-testing-tools-for-windows","286":"product_tag-penetration-testing-vulnerabilities","287":"product_tag-pentesting","288":"product_tag-privilege-escalation","289":"product_tag-privilege-escalation-attack","290":"product_tag-privilege-escalation-attack-vectors","291":"product_tag-privilege-escalation-exploits","292":"product_tag-privilege-escalation-exploits-and-methods","293":"product_tag-privilege-escalation-exploits-and-requirements","294":"product_tag-privilege-escalation-exploits-and-techniques","295":"product_tag-privilege-escalation-exploits-and-techniques-for-firmware","296":"product_tag-privilege-escalation-exploits-and-techniques-for-ics-systems","297":"product_tag-privilege-escalation-exploits-and-techniques-for-industrial-control-systems","298":"product_tag-privilege-escalation-exploits-and-techniques-for-linux","299":"product_tag-privilege-escalation-exploits-and-techniques-for-macos","300":"product_tag-privilege-escalation-exploits-and-techniques-for-mobile-devices","301":"product_tag-privilege-escalation-exploits-and-techniques-for-plc-systems","302":"product_tag-privilege-escalation-exploits-and-techniques-for-scada-systems","303":"product_tag-privilege-escalation-exploits-and-techniques-for-windows","304":"product_tag-privilege-escalation-exploits-and-vulnerabilities","305":"product_tag-privilege-escalation-exploits-and-vulnerabilities-in-linux","306":"product_tag-privilege-escalation-exploits-in-linux","307":"product_tag-privilege-escalation-framework","308":"product_tag-privilege-escalation-lab","309":"product_tag-privilege-escalation-methods","310":"product_tag-privilege-escalation-methods-and-tools","311":"product_tag-privilege-escalation-methods-in-linux","312":"product_tag-privilege-escalation-paths","313":"product_tag-privilege-escalation-techniques","314":"product_tag-privilege-escalation-techniques-for-linux","315":"product_tag-privilege-escalation-tools","316":"product_tag-privilege-escalation-vectors","317":"product_tag-red-team","318":"product_tag-security-analyst-training","319":"product_tag-security-architect","320":"product_tag-security-architecture","321":"product_tag-security-audit","322":"product_tag-security-auditing","323":"product_tag-security-awareness","324":"product_tag-security-awareness-programs","325":"product_tag-security-awareness-training","326":"product_tag-security-best-practices","327":"product_tag-security-compliance","328":"product_tag-security-controls","329":"product_tag-security-education","330":"product_tag-security-engineer","331":"product_tag-security-frameworks","332":"product_tag-security-incident-management","333":"product_tag-security-incident-reporting","334":"product_tag-security-incident-resolution","335":"product_tag-security-incident-response","336":"product_tag-security-incident-response-plan","337":"product_tag-security-incident-response-plan-development","338":"product_tag-security-incident-response-plan-development-and-implementation","339":"product_tag-security-incident-response-plan-execution","340":"product_tag-security-incident-response-plan-execution-and-management","341":"product_tag-security-incident-response-plan-execution-and-strategies","342":"product_tag-security-incident-response-plan-execution-and-strategies-and-management","343":"product_tag-security-incident-response-plan-execution-and-strategies-and-management-and-policies","344":"product_tag-security-incident-response-plan-implementation-and-management","345":"product_tag-security-incident-response-procedures","346":"product_tag-security-incident-response-procedures-and-policies","347":"product_tag-security-incident-response-strategies","348":"product_tag-security-incident-response-team","349":"product_tag-security-incident-response-team-training","350":"product_tag-security-intelligence","351":"product_tag-security-operations","352":"product_tag-security-operations-center","353":"product_tag-security-operations-center-management","354":"product_tag-security-operations-center-monitoring","355":"product_tag-security-operations-center-strategy","356":"product_tag-security-operations-center-strategy-and-planning","357":"product_tag-security-operations-center-team","358":"product_tag-security-operations-center-tools","359":"product_tag-security-operations-center-tools-and-technologies","360":"product_tag-security-operations-center-training","361":"product_tag-security-operations-center-training-and-best-practices","362":"product_tag-security-operations-center-training-and-best-practices-and-resources","363":"product_tag-security-operations-center-training-and-best-practices-and-resources-and-strategy","364":"product_tag-security-operations-center-training-and-best-practices-and-resources-and-strategy-and-planning","365":"product_tag-security-operations-center-training-and-best-practices-and-resources-and-strategy-and-planning-and-management","366":"product_tag-security-operations-center-training-and-best-practices-and-strategy","367":"product_tag-security-operations-center-training-and-development","368":"product_tag-security-operations-center-training-and-resources","369":"product_tag-security-operations-center-training-and-strategy","370":"product_tag-security-operations-center-training-materials","371":"product_tag-security-operations-center-training-programs","372":"product_tag-security-operations-management","373":"product_tag-security-policies","374":"product_tag-security-procedures","375":"product_tag-security-professional","376":"product_tag-security-tools","377":"product_tag-security-training","378":"product_tag-shell-scripting","379":"product_tag-system-administration","380":"product_tag-system-hardening","381":"product_tag-system-security","382":"product_tag-udemy","383":"product_tag-udemy-course","384":"product_tag-vulnerability-analysis","385":"product_tag-vulnerability-assessment","386":"product_tag-vulnerability-assessment-company","387":"product_tag-vulnerability-assessment-frameworks","388":"product_tag-vulnerability-assessment-methodologies","389":"product_tag-vulnerability-assessment-reports","390":"product_tag-vulnerability-assessment-services","391":"product_tag-vulnerability-assessment-software","392":"product_tag-vulnerability-assessment-techniques","393":"product_tag-vulnerability-assessment-tools","394":"product_tag-vulnerability-assessment-tools-and-companies","395":"product_tag-vulnerability-assessment-tools-and-methodologies","396":"product_tag-vulnerability-assessment-tools-and-reports","397":"product_tag-vulnerability-assessment-tools-and-services","398":"product_tag-vulnerability-assessment-tools-and-services-and-companies","399":"product_tag-vulnerability-assessment-tools-and-techniques","400":"product_tag-vulnerability-assessment-tools-and-techniques-and-services","401":"product_tag-vulnerability-assessment-tools-and-techniques-and-services-and-companies","402":"product_tag-vulnerability-assessment-tools-and-techniques-and-services-and-companies-and-reports","403":"product_tag-vulnerability-assessment-training","404":"product_tag-vulnerability-databases","405":"product_tag-vulnerability-exploitation","406":"product_tag-vulnerability-management","407":"product_tag-vulnerability-management-systems","408":"product_tag-vulnerability-mitigation","409":"product_tag-vulnerability-penetration-testing","410":"product_tag-vulnerability-remediation","411":"product_tag-vulnerability-scanning","412":"pmpro-has-access","413":"desktop-align-left","414":"tablet-align-left","415":"mobile-align-left","417":"first","418":"instock","419":"shipping-taxable","420":"purchasable","421":"product-type-variable"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u062f\u0648\u0631\u0647 \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0628\u0627 Hack The Box \u0628\u0631 \u0631\u0648\u06cc \u0641\u0644\u0634 32GB - \u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/express24.ir\/d\/product\/\u062f\u0648\u0631\u0647-\u067e\u06cc\u0634\u0631\u0641\u062a\u0647-\u0627\u0631\u062a\u0642\u0627\u0621-\u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a-\u0644\u06cc\u0646\u0648\u06a9\u0633-\u0628\/\" \/>\n<meta property=\"og:locale\" content=\"fa_IR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u062f\u0648\u0631\u0647 \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0628\u0627 Hack The Box \u0628\u0631 \u0631\u0648\u06cc \u0641\u0644\u0634 32GB - \u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633\" \/>\n<meta property=\"og:description\" content=\"\u0646\u0627\u0645 \u0645\u062d\u0635\u0648\u0644 \u0628\u0647 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc Udemy &#8211; Advanced Linux Privilege Escalation with Hack The Box 2022-11 &#8211; \u0646\u0627\u0645 \u0645\u062d\u0635\u0648\u0644 \u0628\u0647 \u0641\u0627\u0631\u0633\u06cc [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/express24.ir\/d\/product\/\u062f\u0648\u0631\u0647-\u067e\u06cc\u0634\u0631\u0641\u062a\u0647-\u0627\u0631\u062a\u0642\u0627\u0621-\u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a-\u0644\u06cc\u0646\u0648\u06a9\u0633-\u0628\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-28T16:41:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/express24.ir\/d\/wp-content\/uploads\/2025\/08\/Express24_ir-600x600-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"503\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0632\u0645\u0627\u0646 \u062a\u0642\u0631\u06cc\u0628\u06cc \u0628\u0631\u0627\u06cc \u062e\u0648\u0627\u0646\u062f\u0646\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 \u062f\u0642\u06cc\u0642\u0647\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/express24.ir\/d\/product\/%d8%af%d9%88%d8%b1%d9%87-%d9%be%db%8c%d8%b4%d8%b1%d9%81%d8%aa%d9%87-%d8%a7%d8%b1%d8%aa%d9%82%d8%a7%d8%a1-%d8%a7%d9%85%d8%aa%db%8c%d8%a7%d8%b2%d8%a7%d8%aa-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3-%d8%a8\/\",\"url\":\"https:\/\/express24.ir\/d\/product\/%d8%af%d9%88%d8%b1%d9%87-%d9%be%db%8c%d8%b4%d8%b1%d9%81%d8%aa%d9%87-%d8%a7%d8%b1%d8%aa%d9%82%d8%a7%d8%a1-%d8%a7%d9%85%d8%aa%db%8c%d8%a7%d8%b2%d8%a7%d8%aa-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3-%d8%a8\/\",\"name\":\"\u062f\u0648\u0631\u0647 \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0628\u0627 Hack The Box \u0628\u0631 \u0631\u0648\u06cc \u0641\u0644\u0634 32GB - \u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633\",\"isPartOf\":{\"@id\":\"https:\/\/express24.ir\/d\/#website\"},\"datePublished\":\"2025-08-28T16:41:24+00:00\",\"dateModified\":\"2025-08-28T16:41:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/express24.ir\/d\/product\/%d8%af%d9%88%d8%b1%d9%87-%d9%be%db%8c%d8%b4%d8%b1%d9%81%d8%aa%d9%87-%d8%a7%d8%b1%d8%aa%d9%82%d8%a7%d8%a1-%d8%a7%d9%85%d8%aa%db%8c%d8%a7%d8%b2%d8%a7%d8%aa-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3-%d8%a8\/#breadcrumb\"},\"inLanguage\":\"fa-IR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/express24.ir\/d\/product\/%d8%af%d9%88%d8%b1%d9%87-%d9%be%db%8c%d8%b4%d8%b1%d9%81%d8%aa%d9%87-%d8%a7%d8%b1%d8%aa%d9%82%d8%a7%d8%a1-%d8%a7%d9%85%d8%aa%db%8c%d8%a7%d8%b2%d8%a7%d8%aa-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3-%d8%a8\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/express24.ir\/d\/product\/%d8%af%d9%88%d8%b1%d9%87-%d9%be%db%8c%d8%b4%d8%b1%d9%81%d8%aa%d9%87-%d8%a7%d8%b1%d8%aa%d9%82%d8%a7%d8%a1-%d8%a7%d9%85%d8%aa%db%8c%d8%a7%d8%b2%d8%a7%d8%aa-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3-%d8%a8\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u062e\u0627\u0646\u0647\",\"item\":\"https:\/\/express24.ir\/d\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u0641\u0631\u0648\u0634\u06af\u0627\u0647\",\"item\":\"https:\/\/express24.ir\/d\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u062f\u0648\u0631\u0647 \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0628\u0627 Hack The Box \u0628\u0631 \u0631\u0648\u06cc \u0641\u0644\u0634 32GB\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/express24.ir\/d\/#website\",\"url\":\"https:\/\/express24.ir\/d\/\",\"name\":\"\u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/express24.ir\/d\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fa-IR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u062f\u0648\u0631\u0647 \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0628\u0627 Hack The Box \u0628\u0631 \u0631\u0648\u06cc \u0641\u0644\u0634 32GB - \u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/express24.ir\/d\/product\/\u062f\u0648\u0631\u0647-\u067e\u06cc\u0634\u0631\u0641\u062a\u0647-\u0627\u0631\u062a\u0642\u0627\u0621-\u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a-\u0644\u06cc\u0646\u0648\u06a9\u0633-\u0628\/","og_locale":"fa_IR","og_type":"article","og_title":"\u062f\u0648\u0631\u0647 \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0628\u0627 Hack The Box \u0628\u0631 \u0631\u0648\u06cc \u0641\u0644\u0634 32GB - \u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633","og_description":"\u0646\u0627\u0645 \u0645\u062d\u0635\u0648\u0644 \u0628\u0647 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc Udemy &#8211; Advanced Linux Privilege Escalation with Hack The Box 2022-11 &#8211; \u0646\u0627\u0645 \u0645\u062d\u0635\u0648\u0644 \u0628\u0647 \u0641\u0627\u0631\u0633\u06cc [&hellip;]","og_url":"https:\/\/express24.ir\/d\/product\/\u062f\u0648\u0631\u0647-\u067e\u06cc\u0634\u0631\u0641\u062a\u0647-\u0627\u0631\u062a\u0642\u0627\u0621-\u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a-\u0644\u06cc\u0646\u0648\u06a9\u0633-\u0628\/","og_site_name":"\u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633","article_modified_time":"2025-08-28T16:41:40+00:00","og_image":[{"width":600,"height":503,"url":"https:\/\/express24.ir\/d\/wp-content\/uploads\/2025\/08\/Express24_ir-600x600-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"\u0632\u0645\u0627\u0646 \u062a\u0642\u0631\u06cc\u0628\u06cc \u0628\u0631\u0627\u06cc \u062e\u0648\u0627\u0646\u062f\u0646":"1 \u062f\u0642\u06cc\u0642\u0647"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/express24.ir\/d\/product\/%d8%af%d9%88%d8%b1%d9%87-%d9%be%db%8c%d8%b4%d8%b1%d9%81%d8%aa%d9%87-%d8%a7%d8%b1%d8%aa%d9%82%d8%a7%d8%a1-%d8%a7%d9%85%d8%aa%db%8c%d8%a7%d8%b2%d8%a7%d8%aa-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3-%d8%a8\/","url":"https:\/\/express24.ir\/d\/product\/%d8%af%d9%88%d8%b1%d9%87-%d9%be%db%8c%d8%b4%d8%b1%d9%81%d8%aa%d9%87-%d8%a7%d8%b1%d8%aa%d9%82%d8%a7%d8%a1-%d8%a7%d9%85%d8%aa%db%8c%d8%a7%d8%b2%d8%a7%d8%aa-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3-%d8%a8\/","name":"\u062f\u0648\u0631\u0647 \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0628\u0627 Hack The Box \u0628\u0631 \u0631\u0648\u06cc \u0641\u0644\u0634 32GB - \u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633","isPartOf":{"@id":"https:\/\/express24.ir\/d\/#website"},"datePublished":"2025-08-28T16:41:24+00:00","dateModified":"2025-08-28T16:41:40+00:00","breadcrumb":{"@id":"https:\/\/express24.ir\/d\/product\/%d8%af%d9%88%d8%b1%d9%87-%d9%be%db%8c%d8%b4%d8%b1%d9%81%d8%aa%d9%87-%d8%a7%d8%b1%d8%aa%d9%82%d8%a7%d8%a1-%d8%a7%d9%85%d8%aa%db%8c%d8%a7%d8%b2%d8%a7%d8%aa-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3-%d8%a8\/#breadcrumb"},"inLanguage":"fa-IR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/express24.ir\/d\/product\/%d8%af%d9%88%d8%b1%d9%87-%d9%be%db%8c%d8%b4%d8%b1%d9%81%d8%aa%d9%87-%d8%a7%d8%b1%d8%aa%d9%82%d8%a7%d8%a1-%d8%a7%d9%85%d8%aa%db%8c%d8%a7%d8%b2%d8%a7%d8%aa-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3-%d8%a8\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/express24.ir\/d\/product\/%d8%af%d9%88%d8%b1%d9%87-%d9%be%db%8c%d8%b4%d8%b1%d9%81%d8%aa%d9%87-%d8%a7%d8%b1%d8%aa%d9%82%d8%a7%d8%a1-%d8%a7%d9%85%d8%aa%db%8c%d8%a7%d8%b2%d8%a7%d8%aa-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3-%d8%a8\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u062e\u0627\u0646\u0647","item":"https:\/\/express24.ir\/d\/"},{"@type":"ListItem","position":2,"name":"\u0641\u0631\u0648\u0634\u06af\u0627\u0647","item":"https:\/\/express24.ir\/d\/"},{"@type":"ListItem","position":3,"name":"\u062f\u0648\u0631\u0647 \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0628\u0627 Hack The Box \u0628\u0631 \u0631\u0648\u06cc \u0641\u0644\u0634 32GB"}]},{"@type":"WebSite","@id":"https:\/\/express24.ir\/d\/#website","url":"https:\/\/express24.ir\/d\/","name":"\u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/express24.ir\/d\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fa-IR"}]}},"_links":{"self":[{"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/product\/122705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/comments?post=122705"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/media\/113382"}],"wp:attachment":[{"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/media?parent=122705"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/product_cat?post=122705"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/product_tag?post=122705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}