Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ Microsoft AZ-900
Photoshop Graphic Design Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Meditation Life Purpose Coaching Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee

This course includes:

  • 6.5 hours on-demand video
  • 1 article
  • Full lifetime access
  • Access on mobile and TV
IT & Software Network & Security Ethical Hacking

Linux Privilege Escalation for Beginners

2020 launch! Learn how to escalate privileges on Linux machines with absolutely no filler.
Rating: 4.7 out of 54.7 (784 ratings)
6,730 students
Created by Heath Adams, TCM Security, Inc.
Last updated 6/2020
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Ethical hacking and penetration testing skills
  • Linux privilege escalation techniques
  • Common privilege escalation tools and methodology
  • Preparation for capture the flag style exams and events
Curated for the Udemy for Business collection

Requirements

  • Prior beginner hacking knowledge preferred
  • Prior virtualization knowledge preferred
  • Access to a Windows machine is preferred

Description

This course focuses on Linux Privilege Escalation tactics and techniques designed to help you improve your privilege escalation game.  Students should take this course if they are interested in:

  • Gaining a better understanding of privilege escalation techniques

  • Improving Capture the Flag skillset

  • Preparing for certifications such as the OSCP, eCPPT, CEH, etc.

What will I learn?

1) How to enumerate Linux systems manually and with tools

2) A multitude of privilege escalation techniques, including:

  • Kernel Exploits

  • Password Hunting

  • File Permissions

  • Sudo Attacks

  • Shell Escaping

  • Intended Functionality

  • LD_PRELOAD

  • CVE-2019-14287

  • CVE-2019-18634

  • SUID Attacks

  • Shared Object Injection

  • Binary Symlinks

  • Environment Variables

  • Capabilities Attacks

  • Scheduled Tasks

  • NFS

  • Docker


3) Tons of hands-on experience, including:

  • 11 vulnerable machines total

  • Capstone challenge

  • Custom lab with no installation required

Who this course is for:

  • Students interested in ethical hacking and cybersecurity
  • Students interested in improving privilege escalation skillset

Featured review

Deo Martinez
Deo Martinez
69 courses
6 reviews
Rating: 5.0 out of 57 months ago
Heath does a great job explaining the concepts of pen testing and follows it up with hands-on examples. Its easy to follow his methodology and he gives plenty of advice on some of the common tools to use based on the findings illustrated in his course. Great job, Heath!

Course content

16 sections • 51 lectures • 6h 20m total length

  • Preview07:59
  • Course Tips & Resources
    05:48
  • Course Repo
    00:00

  • Lab Overview & Initial Access
    07:17

  • Preview06:08
  • User Enumeration
    04:52
  • Network Enumeration
    04:09
  • Password Hunting
    05:51

  • Introduction
    04:41
  • Exploring Automated Tools
    11:40

  • Kernel Exploits Overview
    03:17
  • Escalation via Kernel Exploit
    06:06

  • Overview
    00:34
  • Escalation via Stored Passwords
    08:31
  • Escalation via Weak File Permissions
    10:36
  • Escalation via SSH Keys
    05:39

  • Sudo Overview
    01:15
  • Escalation via Sudo Shell Escaping
    06:39
  • Escalation via Intended Functionality
    04:41
  • Escalation via LD_PRELOAD
    07:01
  • Challenge Overview
    01:18
  • Challenge Walkthrough
    12:45
  • CVE-2019-14287 Overview
    03:14
  • Escalation via CVE-2019-14287
    02:35
  • Overview & Escalation via CVE-2019-18634
    06:42

  • SUID Overview
    08:21
  • Gaining a Foothold
    13:04
  • Escalation via SUID
    06:34

  • Escalation via Shared Object Injection
    11:28
  • Escalation via Binary Symlinks
    09:29
  • Escalation via Environment Variables
    11:13

  • Capabilities Overview
    03:36
  • Escalation via Capabilities
    02:43

Instructors

Heath Adams
Senior Penetration Tester
Heath Adams
  • 4.7 Instructor Rating
  • 21,523 Reviews
  • 169,800 Students
  • 4 Courses

Hi everyone! My name is Heath Adams, but I also go by "The Cyber Mentor" on social media.  I am the founder and CEO of TCM Security and while I am an ethical hacker by trade,  I love to teach!  I have taught courses on multiple platforms, including YouTube, Twitch, and INE.

In terms of certifications, I am currently OSCP, OSWP, eCPPTX, eWPT, CEH, Pentest+, CCNA, Linux+, Security+, Network+, and A+ certified. 

I'm also a husband, animal dad, tinkerer, and military vet.  I hope you enjoy my courses.

TCM Security, Inc.
Penetration Testing and Training Company
TCM Security, Inc.
  • 4.7 Instructor Rating
  • 21,523 Reviews
  • 169,800 Students
  • 4 Courses

Originally founded in Charlotte, NC, the TCM Security team has serviced clients around the globe, including Fortune 500, government, educational, and non-profits. We are a veteran-owned cybersecurity practice that brings together decades of cybersecurity experience and strong core values from our time in service. We have spent thousands of hours protecting people, data, and systems and look forward to the opportunity to do the same for your environments.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.