Главная
Study mode:
on
1
- Overview
2
- Course Introduction
3
- Course Tips & Resources
4
- Gaining a Foothold: Intro and Shell Access
5
- System Enumeration
6
- User Enumeration
7
- Network Enumeration
8
- Password Enumeration
9
- Automated Tools Intro
10
- Exploring Automated Tools
11
- Kernel Exploits Overview
12
- Escalation via Kernel Exploits
13
- Passwords and File Permissions Overview
14
- Escalation via Stored Passwords
15
- Escalation via Weak File Permissions
16
- Escalation via SSH Keys
17
- Sudo Overview
18
- Escalation via Sudo Shell Escaping
19
- Escalation via Intended Functionality
20
- Escalation via LD_PRELOAD
21
- Challenge Overview
22
- Challenge Walkthrough
23
- CVE-2019-14287 Overview
24
- Escalation via CVE-2019-14287
25
- Overview and Escalation via CVE-2019-18634
26
- SUID Overview
27
- Gaining a Foothold
28
- Escalation via SUID
29
- Conclusion
Description:
Dive into a comprehensive video course on Linux privilege escalation techniques for beginners. Learn essential skills including system, user, network, and password enumeration. Explore automated tools and understand kernel exploits. Master various escalation methods such as exploiting stored passwords, weak file permissions, SSH keys, and sudo vulnerabilities. Tackle real-world challenges, analyze specific CVEs, and gain hands-on experience with SUID-based privilege escalation. Equip yourself with the knowledge to identify and exploit vulnerabilities in Linux systems, enhancing your cybersecurity expertise.

Linux Privilege Escalation for Beginners

Cyber Mentor
Add to list