05-09-2024, 03:11 AM
![[Image: 6ed2f7ee5783603da61148c27cd92461.jpg]](https://i123.fastpic.org/big/2024/0509/61/6ed2f7ee5783603da61148c27cd92461.jpg)
Published 5/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.21 GB | Duration: 2h 23m
A perfect Linux privilege escalation from fundamental to hands-on demonstration | 2024 UPDATED
What you'll learn
In depth explanations of fundamentals with practically of why and how these methods work.
Possible methods for escalating privileges on a Linux system.
Tools which can help identify potential privilege escalation vulnerabilities on a Linux system.
How to Do Privilege Escalation in Linux
How to escalate privileges in CTFs such as HackTheBox, TryHackMe and more
How to succeed in CTF style exams such as the OSCP, eCPPT and CEH
How to level up your ethical hacking, penetration testing and red teaming skills to earn more money in your career
Requirements
Basic Knowledge of Virtual Machines
Basic Knowledge of Linux Commands
TryHackMe and HackTheBox account are Required
A familiarity with hacking tools such as Kali Linux and metasploit / msfvenom
Description
Are you ready to delve deep into the world of Linux privilege escalation? In this comprehensive course, you'll master the art of elevating your privileges on Linux systems, equipping you with essential skills to defend against potential security breaches and enhance your overall cybersecurity prowess.Course Overview:Understanding Linux Privilege Escalation Fundamentals:Explore the basics of privilege escalation, including user permissions, file ownership, and system vulnerabilities.Enumeration Techniques:Learn advanced enumeration techniques to gather crucial information about the system, users, processes, and vulnerabilities.Exploitation Methods


Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 Kali Linux Setup
Lecture 3 Linux File System
Lecture 4 Linux Basic Commands
Lecture 5 File Permission in Linux
Lecture 6 Privilege Escalation in Linux
Section 2: Initial Enumeration
Lecture 7 System Enumeration
Lecture 8 User Enumeration
Lecture 9 Network Enumeration
Section 3: CTF Practice Machine Setup
Lecture 10 TryHackMe Walkthrough
Lecture 11 HackTheBoxWalkthrough
Section 4: Weak File Permission
Lecture 12 Readable Shadow File
Lecture 13 Writeable Shadow File
Lecture 14 Writable Passwd File
Section 5: Cron Jobs
Lecture 15 Fundamentals of Cron Jobs
Lecture 16 Cron Jobs File Permissions
Lecture 17 Cron Jobs Path Environment Variable
Lecture 18 Cron Jobs WildCards
Section 6: SUID / SGID Executables
Lecture 19 Known Exploits
Lecture 20 Shared Object Injection
Lecture 21 Environment Variables
Lecture 22 Abusing Shell Features
Section 7: Kernel Exploitation
Lecture 23 Fundamentals of Kernel
Lecture 24 Practical Session
Section 8: Capabilities Exploitation
Lecture 25 Fundamentals of Capabilities
Lecture 26 Practical Session
Section 9: NFS Exploitation
Lecture 27 Fundamentals of NFS
Lecture 28 Practical Session
Section 10: Automated Scripts
Lecture 29 Smart Work | Automated Scripts to Get Vulnerabilities Details
Beginner and intermediate ethical hackers.,Students Pursuing OSCP,Users Pursuing Ethical Hacker Certification,Users willing to learn how to perform privilage escalation,Students interested in how attackers escalate privileges on popular Linux servers
Homepage
![[Image: signature.png]](https://softwarez.info/images/avsg/signature.png)