Linux Privilege Escalation for OSCP & Beyond!
- 1.5 hours on-demand video
- 3 downloadable resources
- Full lifetime access
- Access on mobile and TV
- Certificate of Completion
Get your team access to 4,000+ top Udemy courses anytime, anywhere.Try Udemy for Business
- Multiple methods for escalating privileges on a Linux system.
- In depth explanations of why and how these methods work.
- Tools which can help identify potential privilege escalation vulnerabilities on a Linux system.
- A free intentionally vulnerable Debian Linux VM to practice privilege escalation on.
- A basic understanding of Linux systems
This course teaches privilege escalation in Linux, from basics such as how permissions work, to in-depth coverage and demonstrations of actual privilege escalation techniques. The course comes with a full set of slides (170+), and an intentionally misconfigured Debian VM which can be used by students to practice their own privilege escalation.
Please note that this course is aimed at students currently taking, or planning to take the OSCP, and thus covers more common forms of privilege escalation. Some extra methods are included, and more methods may be added in the future, however this course was not designed to cover every possible (or obscure) method.
- Beginner and intermediate ethical hackers.
- Students currently taking or planning to take the PWK/OSCP course.
An introduction to your lecturer and what the course covers, as well as setting up the practice Debian VM. The VM is provided as a downloadable material in this lecture, as are the full slides for the entire course. These slides contain all the information from the video lectures, as well as step-by-step instructions for performing the privilege escalations.
A few ways to spawn root shells in Linux, all of which will make an appearance in the course.