Multiple methods for escalating privileges on a Linux system.
In depth explanations of why and how these methods work.
Tools which can help identify potential privilege escalation vulnerabilities on a Linux system.
A free intentionally vulnerable Debian Linux VM to practice privilege escalation on.
A basic understanding of Linux systems
This course teaches privilege escalation in Linux, from basics such as how permissions work, to in-depth coverage and demonstrations of actual privilege escalation techniques. The course comes with a full set of slides (170+), and an intentionally misconfigured Debian VM which can be used by students to practice their own privilege escalation.
Please note that this course is aimed at students currently taking, or planning to take the OSCP, and thus covers more common forms of privilege escalation. Some extra methods are included, and more methods may be added in the future, however this course was not designed to cover every possible (or obscure) method.
Who this course is for:
Beginner and intermediate ethical hackers.
Students currently taking or planning to take the PWK/OSCP course.
Rating: 5.0 out of 510 months ago
This course was great. The instructor's presentation of the material was clear and concise. His explanation and demonstration of the Linux privilege escalation methods were very helpful and allowed me to get a better understanding of how to escalate privileges in Linux in preparation for the OSCP exam. I will definitely add these my escalation methods chart. I look forward to more classes from this instructor.
Tib3rius is a professional penetration tester who specializes in web application hacking, though his background also includes network penetration testing. He is OSCP certified, and likes developing new tools for penetration testing, mostly in Python. He helps run an OSCP prep discord server, and enjoys passing on his knowledge to students who have a passion for information security.