Introduction
In this course, you will learn how to escalate privileges on Linux systems using various techniques.
ðŊ Tasks
In this course, you will learn:
- How to upgrade a simple shell to an interactive shell
- How to escalate privileges via the /etc/passwd and /etc/shadow files
- How to leverage SUID binaries for privilege escalation
- How to escalate privileges through cron jobs
- How to exploit wildcard injection for privilege escalation
- How to escalate privileges via the sudo command
- How to exploit sensitive files for privilege escalation
- How to use a stepping stone user for privilege escalation
- How to perform brute force attacks for privilege escalation
- How to use automation tools for privilege escalation
ð Achievements
After completing this course, you will be able to:
- Identify and exploit various Linux privilege escalation techniques
- Understand the importance of securing Linux systems against privilege escalation attacks
- Develop the skills to assess and mitigate privilege escalation vulnerabilities in Linux environments