Linux Privilege Escalation Walkthrough
.MP4, AVC, 1920x1080, 30 fps | English, AAC, 2 Ch | 40m | 135 MB
Instructor: John Tear
In this course, you will analyze sudo/suid configurations, files/directories, cron jobs, configuration files, and user artefacts to uncover misconfigurations that can be abused for elevated access.
What you'll learn
This walkthrough teaches you how to methodically enumerate a Linux system from an assumed breach and identify common privilege escalation opportunities.
In this course, Linux Privilege Escalation Walkthrough, you will learn how to identify and exploit common Linux privilege escalation weaknesses from an assumed breach scenario.
First, you will first explore enumerating a Linux host for common privilege escalation opportunities, identifying sudo/suid configurations, files/directories, cron jobs, configuration files, and user artifacts that may introduce security weaknesses.
Next, you will discover how common misconfigurations can lead to privilege escalation vulnerabilities. Finally, you will learn how to safely exploit these issues in a controlled lab environment while maintaining a clear, repeatable methodology.
By the end of the course, you will have the skills and knowledge required to reliably escalate privileges on Windows systems and understand how these common weaknesses could be mitigated in real environments.
RapidGator
DDownload
NitroFlare
UsersDrive