Course Highlights
  • Multiple methods for escalating privileges on a Linux system.
  • In depth explanations of why and how these methods work.
  • Tools which can help identify potential privilege escalation vulnerabilities on a Linux system.
  • A free intentionally vulnerable Debian Linux VM to practice privilege escalation on.
Curriculum

5 Topics
Introduction
Privilege Escalation in Linux
Understanding Permissions in Linux
Spawning Root Shells
Privilege Escalation Tools

8 Topics
Kernel Exploits
Service Exploits
Weak File Permissions
Sudo
Cron Jobs
SUID / SGID Executables
Passwords & Keys
NFS

1 Topic
Privilege Escalation Strategy

  Write a Review

Linux Privilege Escalation for OSCP & Beyond!

Go to Paid Course