Linux Privilege Escalation for Beginners
Offered By: Udemy
Course Description
Overview
What you'll learn:
- Ethical hacking and penetration testing skills
- Linux privilege escalation techniques
- Common privilege escalation tools and methodology
- Preparation for capture the flag style exams and events
This course focuses on Linux Privilege Escalation tactics and techniques designed to help you improve your privilege escalation game. Students should take this course if they are interested in:
Gaining a better understanding of privilege escalation techniques
Improving Capture the Flag skillset
Preparing for certifications such as the OSCP, eCPPT, CEH, etc.
What will I learn?
1) How to enumerate Linux systems manually and with tools
2) A multitude of privilege escalation techniques, including:
Kernel Exploits
Password Hunting
File Permissions
Sudo Attacks
Shell Escaping
Intended Functionality
LD_PRELOAD
CVE-2019-14287
CVE-2019-18634
SUID Attacks
Shared Object Injection
Binary Symlinks
Environment Variables
Capabilities Attacks
Scheduled Tasks
NFS
Docker
3) Tons of hands-on experience, including:
11 vulnerable machines total
Capstone challenge
Custom lab with no installation required
Taught by
Heath Adams and TCM Security, Inc.
Related Courses
Advanced Commands in LinuxCoursera Project Network via Coursera Amazon Elastic File System (Amazon EFS) Primer (Italian)
Amazon Web Services via AWS Skill Builder Amazon Elastic File System (Amazon EFS) Primer (Japanese)
Amazon Web Services via AWS Skill Builder Amazon Elastic File System (Amazon EFS) Primer (Spanish)
Amazon Web Services via AWS Skill Builder Amazon Lumberyard Primer (French)
Amazon Web Services via AWS Skill Builder