Linux Privilege Escalation for OSCP & Beyond!
4.7 (451 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,542 students enrolled

Linux Privilege Escalation for OSCP & Beyond!

Finding and exploiting Linux vulnerabilities and misconfigurations to gain a root shell.
4.7 (451 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,540 students enrolled
Created by Tib3rius ⁣
Last updated 6/2020
English [Auto]
Price: $19.99
30-Day Money-Back Guarantee
This course includes
  • 1.5 hours on-demand video
  • 3 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Multiple methods for escalating privileges on a Linux system.
  • In depth explanations of why and how these methods work.
  • Tools which can help identify potential privilege escalation vulnerabilities on a Linux system.
  • A free intentionally vulnerable Debian Linux VM to practice privilege escalation on.
  • A basic understanding of Linux systems

This course teaches privilege escalation in Linux, from basics such as how permissions work, to in-depth coverage and demonstrations of actual privilege escalation techniques. The course comes with a full set of slides (170+), and an intentionally misconfigured Debian VM which can be used by students to practice their own privilege escalation.

Please note that this course is aimed at students currently taking, or planning to take the OSCP, and thus covers more common forms of privilege escalation. Some extra methods are included, and more methods may be added in the future, however this course was not designed to cover every possible (or obscure) method.

Who this course is for:
  • Beginner and intermediate ethical hackers.
  • Students currently taking or planning to take the PWK/OSCP course.
Course content
Expand all 14 lectures 01:24:48
+ Introduction
5 lectures 18:30

An introduction to your lecturer and what the course covers, as well as setting up the practice Debian VM. The VM is provided as a downloadable material in this lecture, as are the full slides for the entire course. These slides contain all the information from the video lectures, as well as step-by-step instructions for performing the privilege escalations.

Preview 04:10

A brief summary of what we mean by privilege escalation in the context of Linux systems.

Privilege Escalation in Linux

An in-depth look at how Linux handles permissions, which is essential to understanding how to escalate privileges.

Understanding Permissions in Linux

A few ways to spawn root shells in Linux, all of which will make an appearance in the course.

Preview 02:11

An overview and demo of two popular privilege escalation enumeration tools for Linux.

Preview 04:56
+ Privilege Escalation Techniques
8 lectures 01:03:12

A look at Linux Kernel exploits and a demo of the Dirty Cow exploit that can be used to spawn a root shell.

Kernel Exploits

An overview of service exploits which can lead to root, as well as a demo of a complicated MySQL exploit.

Service Exploits

Multiple methods for exploiting weak file permissions in order to escalate privileges in Linux.

Weak File Permissions

A look at a number of misconfigurations in the Sudo command which can lead to privilege escalation.


Exploiting weaknesses in cron jobs to execute commands with root privileges.

Cron Jobs

A detailed look into SUID and SGID executable files that includes several methods for discovering and exploiting weaknesses to gain elevated privileges.

SUID / SGID Executables

Common locations to look for passwords and keys that may allow you to log in as the root user.

Passwords & Keys

An overview of NFS and a dangerous misconfiguration which lets you create files as the root user.

+ Conclusions
1 lecture 03:06

A brief discussion about privilege escalation strategy to end the course.

Privilege Escalation Strategy