Linux Privilege Escalation for Beginners
What you'll learn
- Ethical hacking and penetration testing skills
- Linux privilege escalation techniques
- Common privilege escalation tools and methodology
- Preparation for capture the flag style exams and events
Requirements
- Prior beginner hacking knowledge preferred
- Prior virtualization knowledge preferred
- Access to a Windows machine is preferred
Description
This course focuses on Linux Privilege Escalation tactics and techniques designed to help you improve your privilege escalation game. Students should take this course if they are interested in:
Gaining a better understanding of privilege escalation techniques
Improving Capture the Flag skillset
Preparing for certifications such as the OSCP, eCPPT, CEH, etc.
What will I learn?
1) How to enumerate Linux systems manually and with tools
2) A multitude of privilege escalation techniques, including:
Kernel Exploits
Password Hunting
File Permissions
Sudo Attacks
Shell Escaping
Intended Functionality
LD_PRELOAD
CVE-2019-14287
CVE-2019-18634
SUID Attacks
Shared Object Injection
Binary Symlinks
Environment Variables
Capabilities Attacks
Scheduled Tasks
NFS
Docker
3) Tons of hands-on experience, including:
11 vulnerable machines total
Capstone challenge
Custom lab with no installation required
Who this course is for:
- Students interested in ethical hacking and cybersecurity
- Students interested in improving privilege escalation skillset
Course content
- Preview07:59
- 05:48Course Tips & Resources
- 00:00Course Repo
Instructors
Hi everyone! My name is Heath Adams, but I also go by "The Cyber Mentor" on social media. I am the founder and CEO of TCM Security and while I am an ethical hacker by trade, I love to teach! I have taught courses on multiple platforms, including YouTube, Twitch, and INE.
In terms of certifications, I am currently OSCP, OSWP, eCPPTX, eWPT, CEH, Pentest+, CCNA, Linux+, Security+, Network+, and A+ certified.
I'm also a husband, animal dad, tinkerer, and military vet. I hope you enjoy my courses.
Originally founded in Charlotte, NC, the TCM Security team has serviced clients around the globe, including Fortune 500, government, educational, and non-profits. We are a veteran-owned cybersecurity practice that brings together decades of cybersecurity experience and strong core values from our time in service. We have spent thousands of hours protecting people, data, and systems and look forward to the opportunity to do the same for your environments.