
Course Overview
This course focuses on Linux Privilege Escalation tactics and techniques designed to help you improve your privilege escalation game. Students should take this course if they are interested in:
Requirements
- Prior beginner hacking knowledge preferred
- Prior virtualization knowledge preferred
- Access to a Windows machine is preferred
What will I learn?
1) How to enumerate Linux systems manually and with tools
2) A multitude of privilege escalation techniques, including:
- Kernel Exploits
- Password Hunting
- File Permissions
- Sudo Attacks
- Shell Escaping
- Intended Functionality
- LD_PRELOAD
- CVE-2019-14287
- CVE-2019-18634
- SUID Attacks
- Shared Object Injection
- Binary Symlinks
- Environment Variables
- Capabilities Attacks
- Scheduled Tasks
- NFS
- Docker