Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Linux Red Team Privilege Escalation Techniques - Kernel Exploits and SUDO Permissions

HackerSploit via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the process of elevating privileges on Linux systems through kernel exploits, local accounts, and misconfigured SUDO permissions in this 41-minute video tutorial. Learn about privilege escalation techniques used by adversaries to gain higher-level permissions on systems and networks. Discover common approaches for taking advantage of system weaknesses, misconfigurations, and vulnerabilities. Gain insights into red team tactics for Linux privilege escalation, focusing on kernel exploits and SUDO permission abuse. Enhance your understanding of cybersecurity and penetration testing methodologies to better protect against and identify potential security threats in Linux environments.

Syllabus

Linux Red Team Privilege Escalation Techniques - Kernel Exploits & SUDO Permissions

Taught by

HackerSploit

Reviews

Start your review of Linux Red Team Privilege Escalation Techniques - Kernel Exploits and SUDO Permissions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.