This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Linux Privilege Escalation for OSCP & Beyond!
Introduction
Introduction (4:10)
Privilege Escalation in Linux (0:49)
Understanding Permissions in Linux (6:24)
Spawning Root Shells (2:11)
Privilege Escalation Tools (4:56)
Privilege Escalation Techniques
Kernel Exploits (3:44)
Service Exploits (7:29)
Weak File Permissions (9:36)
Sudo (9:01)
Cron Jobs (8:42)
SUID / SGID Executables (17:20)
Passwords & Keys (3:32)
NFS (3:48)
Conclusions
Privilege Escalation Strategy (3:06)
Cron Jobs
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock