Check Your Privilege Escalation
Offered By: YouTube
Course Description
Overview
Explore privilege escalation techniques in this 42-minute conference talk from BSides Columbus 2019. Delve into various aspects of privilege escalation, including permissions, credential reuse, and SUID/SGID bits. Learn about easy mode exploits, command option arguments, and SUID exploits. Discover sneaky mode techniques and kernel exploits. Gain insights into bass mode strategies and access valuable resources for further learning. Enhance your understanding of cybersecurity and privilege escalation methods through this comprehensive presentation.
Syllabus
Introduction
Privilege Escalation
Permissions
Credential Reuse
Easy Mode
SUID/SGID bits
Cmd option arguments
SUID Exploit
Sneaky Mode
Kernel Exploits
Bass Mode
Resources & Contact
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube