Linux Privilege Escalation for Beginners

Linux Privilege Escalation for Beginners

The Cyber Mentor via YouTube Direct link

- Overview

1 of 29

1 of 29

- Overview

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Linux Privilege Escalation for Beginners

Automatically move to the next video in the Classroom when playback concludes

  1. 1 - Overview
  2. 2 - Course Introduction
  3. 3 - Course Tips & Resources
  4. 4 - Gaining a Foothold: Intro and Shell Access
  5. 5 - System Enumeration
  6. 6 - User Enumeration
  7. 7 - Network Enumeration
  8. 8 - Password Enumeration
  9. 9 - Automated Tools Intro
  10. 10 - Exploring Automated Tools
  11. 11 - Kernel Exploits Overview
  12. 12 - Escalation via Kernel Exploits
  13. 13 - Passwords and File Permissions Overview
  14. 14 - Escalation via Stored Passwords
  15. 15 - Escalation via Weak File Permissions
  16. 16 - Escalation via SSH Keys
  17. 17 - Sudo Overview
  18. 18 - Escalation via Sudo Shell Escaping
  19. 19 - Escalation via Intended Functionality
  20. 20 - Escalation via LD_PRELOAD
  21. 21 - Challenge Overview
  22. 22 - Challenge Walkthrough
  23. 23 - CVE-2019-14287 Overview
  24. 24 - Escalation via CVE-2019-14287
  25. 25 - Overview and Escalation via CVE-2019-18634
  26. 26 - SUID Overview
  27. 27 - Gaining a Foothold
  28. 28 - Escalation via SUID
  29. 29 - Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.