Overview
Syllabus
- Overview
- Course Introduction
- Course Tips & Resources
- Gaining a Foothold: Intro and Shell Access
- System Enumeration
- User Enumeration
- Network Enumeration
- Password Enumeration
- Automated Tools Intro
- Exploring Automated Tools
- Kernel Exploits Overview
- Escalation via Kernel Exploits
- Passwords and File Permissions Overview
- Escalation via Stored Passwords
- Escalation via Weak File Permissions
- Escalation via SSH Keys
- Sudo Overview
- Escalation via Sudo Shell Escaping
- Escalation via Intended Functionality
- Escalation via LD_PRELOAD
- Challenge Overview
- Challenge Walkthrough
- CVE-2019-14287 Overview
- Escalation via CVE-2019-14287
- Overview and Escalation via CVE-2019-18634
- SUID Overview
- Gaining a Foothold
- Escalation via SUID
- Conclusion
Taught by
The Cyber Mentor