Check Your Privilege Escalation
Offered By: YouTube
Course Description
Overview
Explore privilege escalation techniques in this 42-minute conference talk from BSides Columbus 2019. Delve into various aspects of privilege escalation, including permissions, credential reuse, and SUID/SGID bits. Learn about easy mode exploits, command option arguments, and SUID exploits. Discover sneaky mode techniques and kernel exploits. Gain insights into bass mode strategies and access valuable resources for further learning. Enhance your understanding of cybersecurity and privilege escalation methods through this comprehensive presentation.
Syllabus
Introduction
Privilege Escalation
Permissions
Credential Reuse
Easy Mode
SUID/SGID bits
Cmd option arguments
SUID Exploit
Sneaky Mode
Kernel Exploits
Bass Mode
Resources & Contact
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX