2020 launch! Learn how to escalate privileges on Linux machines with absolutely no filler.
What you’ll learn
-
Linux privilege escalation techniques
-
Common privilege escalation tools and methodology
-
Preparation for capture the flag style exams and events
Requirements
-
Prior beginner hacking knowledge preferred
-
Prior virtualization knowledge preferred
-
Access to a Windows machine is preferred
Description
This course focuses on Linux Privilege Escalation tactics and techniques designed to help you improve your privilege escalation game. Students should take this course if they are interested in:
- Gaining a better understanding of privilege escalation techniques
- Improving Capture the Flag skillset
- Preparing for certifications such as the OSCP, eCPPT, CEH, etc.
What will I learn?
1) How to enumerate Linux systems manually and with tools
2) A multitude of privilege escalation techniques, including:
- Kernel Exploits
- Password Hunting
- File Permissions
- Sudo Attacks
- Shell Escaping
- Intended Functionality
- LD_PRELOAD
- CVE-2019-14287
- CVE-2019-18634
- SUID Attacks
- Shared Object Injection
- Binary Symlinks
- Environment Variables
- Capabilities Attacks
- Scheduled Tasks
- NFS
- Docker
3) Tons of hands-on experience, including:
- 11 vulnerable machines total
- Capstone challenge
- Custom lab with no installation required
Who this course is for:
- Students interested in ethical hacking and cybersecurity
- Students interested in improving privilege escalation skillset
Featured review
Heath does a great job explaining the concepts of pen testing and follows it up with hands-on examples. Its easy to follow his methodology and he gives plenty of advice on some of the common tools to use based on the findings illustrated in his course. Great job, Heath!
Course content
16 sections • 51 lectures • 6h 20m total length
- Introduction
- Lab Overview & Initial Access
- Initial Enumeration
- Exploring Automated Tools
- Escalation Path: Kernel Exploits
- Escalation Path: Passwords & File Permissions
- Escalation Path: Sudo
- Escalation Path: SUID
- Escalation Path: Other SUID Escalation
- Escalation Path: Capabilities
- Escalation Path: Scheduled Tasks
- Escalation Path: NFS Root Squashing
- Escalation Path: Docker
- Capstone Challenge
- Wrapping Up
- BONUS Section
Created by: Heath Adams, TCM Security, Inc.
Last updated 6/2020
English
English [Auto]
Direct Download Available
4.8
4.8
6,884 students
https://www.udemy.com/course/linux-privilege-escalation-for-beginners/
Download link
