YoVDO

Linux Privilege Escalation for OSCP & Beyond!

Offered By: Udemy

Tags

Penetration Testing Courses

Course Description

Overview

Finding and exploiting Linux vulnerabilities and misconfigurations to gain a root shell.

What you'll learn:
  • Multiple methods for escalating privileges on a Linux system.
  • In depth explanations of why and how these methods work.
  • Tools which can help identify potential privilege escalation vulnerabilities on a Linux system.
  • A free intentionally vulnerable Debian Linux VM to practice privilege escalation on.

This course teaches privilege escalation in Linux, from basics such as how permissions work, to in-depth coverage and demonstrations of actual privilege escalation techniques. The course comes with a full set of slides (170+), and an intentionally misconfigured Debian VM which can be used by students to practice their own privilege escalation.


Please note that this course is aimed at students currently taking, or planning to take the OSCP, and thus covers more common forms of privilege escalation. Some extra methods are included, and more methods may be added in the future, however this course was not designed to cover every possible (or obscure) method.


Taught by

Tib3rius ⁣

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent