Privilege Escalation Techniques on Linux

Beginner

In this course, you will learn about privilege escalation techniques on Linux. It is a beginner level course and will cover various techniques to escalate privileges on Linux systems.

Pen Testing

Introduction

In this course, you will learn how to escalate privileges on Linux systems using various techniques.

๐ŸŽฏ Tasks

In this course, you will learn:

  • How to upgrade a simple shell to an interactive shell
  • How to escalate privileges via the /etc/passwd and /etc/shadow files
  • How to leverage SUID binaries for privilege escalation
  • How to escalate privileges through cron jobs
  • How to exploit wildcard injection for privilege escalation
  • How to escalate privileges via the sudo command
  • How to exploit sensitive files for privilege escalation
  • How to use a stepping stone user for privilege escalation
  • How to perform brute force attacks for privilege escalation
  • How to use automation tools for privilege escalation

๐Ÿ† Achievements

After completing this course, you will be able to:

  • Identify and exploit various Linux privilege escalation techniques
  • Understand the importance of securing Linux systems against privilege escalation attacks
  • Develop the skills to assess and mitigate privilege escalation vulnerabilities in Linux environments

Teacher

labby

Labby

Labby is the LabEx teacher.