Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Linux Privilege Escalation for OSCP & Beyond!
Introduction
Introduction (4:10)
Privilege Escalation in Linux (0:49)
Understanding Permissions in Linux (6:24)
Spawning Root Shells (2:11)
Privilege Escalation Tools (4:56)
Privilege Escalation Techniques
Kernel Exploits (3:44)
Service Exploits (7:29)
Weak File Permissions (9:36)
Sudo (9:01)
Cron Jobs (8:42)
SUID / SGID Executables (17:20)
Passwords & Keys (3:32)
NFS (3:48)
Conclusions
Privilege Escalation Strategy (3:06)
Teach online with
Privilege Escalation in Linux
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock