YoVDO

Linux Privilege Escalation Techniques - Red Team Series

Offered By: Linode via YouTube

Tags

Red Team Courses Cybersecurity Courses Ethical Hacking Courses

Course Description

Overview

Dive into advanced Linux privilege escalation techniques in this comprehensive video from the Hackersploit Red Team Series. Learn how to obtain root access, exploit permissions and binaries, and utilize kernel exploits for achieving elevated access. Explore MITRE Attack privilege escalation techniques and follow step-by-step demonstrations on transferring and executing exploits on target systems. Gain valuable insights into the inner workings of these exploits and enhance your red team skills in Linux environments.

Syllabus

Introduction
What We’ll Be Covering
Linux Privilege Escalation Techniques
MITRE Attack Privilege Escalation Techniques
Techniques You Should Follow
How to Obtain Root Access
How to Exploit SUID Binaries / SUDO Permissions
How to Use a Kernel Exploit
How to Transfer the Exploit to the Target
How Does the Exploit Work?
How to Execute the Exploit
Conclusion


Taught by

Linode

Related Courses

Certified Ethical Hacker (CEH) - Linux Academy's Prep Course
A Cloud Guru
Advanced Python Scripting for Cybersecurity
Infosec via Coursera
Introduction to IT Security
Akamai via Coursera
Cyber Comp 1A
Cabrillo College via California Community Colleges System
Ethical Hacking
Cabrillo College via California Community Colleges System