YoVDO

Linux Red Team Privilege Escalation Techniques - Kernel Exploits and SUDO Permissions

Offered By: HackerSploit via YouTube

Tags

Linux Security Courses Cybersecurity Courses Penetration Testing Courses Privilege Escalation Courses

Course Description

Overview

Explore the process of elevating privileges on Linux systems through kernel exploits, local accounts, and misconfigured SUDO permissions in this 41-minute video tutorial. Learn about privilege escalation techniques used by adversaries to gain higher-level permissions on systems and networks. Discover common approaches for taking advantage of system weaknesses, misconfigurations, and vulnerabilities. Gain insights into red team tactics for Linux privilege escalation, focusing on kernel exploits and SUDO permission abuse. Enhance your understanding of cybersecurity and penetration testing methodologies to better protect against and identify potential security threats in Linux environments.

Syllabus

Linux Red Team Privilege Escalation Techniques - Kernel Exploits & SUDO Permissions


Taught by

HackerSploit

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network