Linux Privilege Escalation for Beginners
4.8 (334 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
4,230 students enrolled

Linux Privilege Escalation for Beginners

2020 launch! Learn how to escalate privileges on Linux machines with absolutely no filler.
Highest Rated
4.8 (334 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
4,258 students enrolled
Last updated 6/2020
English
English [Auto]
Current price: $55.99 Original price: $79.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 6.5 hours on-demand video
  • 1 article
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Ethical hacking and penetration testing skills
  • Linux privilege escalation techniques
  • Common privilege escalation tools and methodology
  • Preparation for capture the flag style exams and events
Requirements
  • Prior beginner hacking knowledge preferred
  • Prior virtualization knowledge preferred
  • Access to a Windows machine is preferred
Description

This course focuses on Linux Privilege Escalation tactics and techniques designed to help you improve your privilege escalation game.  Students should take this course if they are interested in:

  • Gaining a better understanding of privilege escalation techniques

  • Improving Capture the Flag skillset

  • Preparing for certifications such as the OSCP, eCPPT, CEH, etc.

What will I learn?

1) How to enumerate Linux systems manually and with tools

2) A multitude of privilege escalation techniques, including:

  • Kernel Exploits

  • Password Hunting

  • File Permissions

  • Sudo Attacks

  • Shell Escaping

  • Intended Functionality

  • LD_PRELOAD

  • CVE-2019-14287

  • CVE-2019-18634

  • SUID Attacks

  • Shared Object Injection

  • Binary Symlinks

  • Environment Variables

  • Capabilities Attacks

  • Scheduled Tasks

  • NFS

  • Docker


3) Tons of hands-on experience, including:

  • 11 vulnerable machines total

  • Capstone challenge

  • Custom lab with no installation required

Who this course is for:
  • Students interested in ethical hacking and cybersecurity
  • Students interested in improving privilege escalation skillset
Course content
Expand all 51 lectures 06:20:33
+ Introduction
3 lectures 13:47
Course Tips & Resources
05:48
Course Repo
00:00
+ Lab Overview & Initial Access
1 lecture 07:17
Lab Overview & Initial Access
07:17
+ Initial Enumeration
4 lectures 21:00
User Enumeration
04:52
Network Enumeration
04:09
Password Hunting
05:51
+ Exploring Automated Tools
2 lectures 16:21
Introduction
04:41
Exploring Automated Tools
11:40
+ Escalation Path: Kernel Exploits
2 lectures 09:23
Kernel Exploits Overview
03:17
Escalation via Kernel Exploit
06:06
+ Escalation Path: Passwords & File Permissions
4 lectures 25:20
Overview
00:34
Escalation via Stored Passwords
08:31
Escalation via Weak File Permissions
10:36
Escalation via SSH Keys
05:39
+ Escalation Path: Sudo
9 lectures 46:10
Sudo Overview
01:15
002 - Escalation via Sudo Shell Escaping
06:39
Escalation via Intended Functionality
04:41
Escalation via LD_PRELOAD
07:01
Challenge Overview
01:18
Challenge Walkthrough
12:45
CVE-2019-14287 Overview
03:14
Escalation via CVE-2019-14287
02:35
Overview & Escalation via CVE-2019-18634
06:42
+ Escalation Path: SUID
3 lectures 27:59
SUID Overview
08:21
Gaining a Foothold
13:04
Escalation via SUID
06:34
+ Escalation Path: Other SUID Escalation
3 lectures 32:10
Escalation via Shared Object Injection
11:28
Escalation via Binary Symlinks
09:29
Escalation via Environment Variables
11:13
+ Escalation Path: Capabilities
2 lectures 06:19
Capabilities Overview
03:36
Escalation via Capabilities
02:43