Linux Privilege Escalation Bootcamp

Linux Privilege Escalation Bootcamp

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 15 Lessons (10h 06m) | 5.63 GB

Linux powers the Internet today, making it a favorite target for attackers. Linux security mechanisms are fairly comprehensive when it comes to coverage, but are also equally complex to get right unless you are an expert. As Linux offers multi-user tenancy, the common perception is that it is impossibly hard to escalate privileges to root.

The focus of this bootcamp is to familiarize you with beginner-to-advanced privilege escalation techniques on Linux. You will learn how to identify and leverage misconfigurations to perform horizontal/vertical escalation. The bootcamp will cover techniques starting from traditional privilege escalation methodologies to advanced concepts such as Linux capabilities. Completing the bootcamp and passing the certification exam will prepare you for performing privilege escalation effectively on Linux-based machines.

Table of Contents

1 Basic Privilege Escalation Techniques – Part 1
2 Basic Privilege Escalation Techniques – Part 2
3 Basic Privilege Escalation Techniques – Part 3
4 Basic Privilege Escalation Techniques – Part 4
5 Basic Privilege Escalation Techniques – Part 5
6 Basic Privilege Escalation Techniques – Part 6
7 Basic Privilege Escalation Techniques – Part 7
8 Breaking Out of Restricted Envrionments – Part 1
9 Breaking Out of Restricted Envrionments – Part 2
10 Breaking Out of Restricted Envrionments – Part 3
11 Breaking Out of Restricted Envrionments – Part 4
12 Linux Capabilities – Part 1
13 Linux Capabilities – Part 2
14 Linux Capabilities – Part 3
15 Linux Capabilities – Part 4

Homepage