Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Linux Privilege Escalation for Beginners

Cyber Mentor via YouTube

Overview

Dive into a comprehensive video course on Linux privilege escalation techniques for beginners. Learn essential skills including system, user, network, and password enumeration. Explore automated tools and understand kernel exploits. Master various escalation methods such as exploiting stored passwords, weak file permissions, SSH keys, and sudo vulnerabilities. Tackle real-world challenges, analyze specific CVEs, and gain hands-on experience with SUID-based privilege escalation. Equip yourself with the knowledge to identify and exploit vulnerabilities in Linux systems, enhancing your cybersecurity expertise.

Syllabus

- Overview
- Course Introduction
- Course Tips & Resources
- Gaining a Foothold: Intro and Shell Access
- System Enumeration
- User Enumeration
- Network Enumeration
- Password Enumeration
- Automated Tools Intro
- Exploring Automated Tools
- Kernel Exploits Overview
- Escalation via Kernel Exploits
- Passwords and File Permissions Overview
- Escalation via Stored Passwords
- Escalation via Weak File Permissions
- Escalation via SSH Keys
- Sudo Overview
- Escalation via Sudo Shell Escaping
- Escalation via Intended Functionality
- Escalation via LD_PRELOAD
- Challenge Overview
- Challenge Walkthrough
- CVE-2019-14287 Overview
- Escalation via CVE-2019-14287
- Overview and Escalation via CVE-2019-18634
- SUID Overview
- Gaining a Foothold
- Escalation via SUID
- Conclusion

Taught by

The Cyber Mentor

Reviews

Start your review of Linux Privilege Escalation for Beginners

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.