Overview
Explore privilege escalation techniques in this 42-minute conference talk from BSides Columbus 2019. Delve into various aspects of privilege escalation, including permissions, credential reuse, and SUID/SGID bits. Learn about easy mode exploits, command option arguments, and SUID exploits. Discover sneaky mode techniques and kernel exploits. Gain insights into bass mode strategies and access valuable resources for further learning. Enhance your understanding of cybersecurity and privilege escalation methods through this comprehensive presentation.
Syllabus
Introduction
Privilege Escalation
Permissions
Credential Reuse
Easy Mode
SUID/SGID bits
Cmd option arguments
SUID Exploit
Sneaky Mode
Kernel Exploits
Bass Mode
Resources & Contact