Course Overview
This course focuses on Linux Privilege Escalation tactics and techniques designed to help you improve your privilege escalation game. Students should take this course if they are interested in:
Prerequisites & System Requirements
- Prior beginner hacking knowledge preferred
- Prior virtualization knowledge preferred
- Access to a Windows machine is preferred
Linux Privilege Escalation Course Objectives
What will I learn?
1) How to enumerate Linux systems manually and with tools
2) A multitude of privilege escalation techniques, including:
- Kernel Exploits
- Password Hunting
- File Permissions
- Sudo Attacks
- Shell Escaping
- Intended Functionality
- LD_PRELOAD
- CVE-2019-14287
- CVE-2019-18634
- SUID Attacks
- Shared Object Injection
- Binary Symlinks
- Environment Variables
- Capabilities Attacks
- Scheduled Tasks
- NFS
- Docker
3) Tons of hands-on experience, including:
- 11 vulnerable machines total
- Capstone challenge
- Custom lab with no installation required