09-12-2023, 03:16 AM
Mastering Linux Privilege Escalation
Learn Linux Privilege Escalation beginner to advanced Level
New
Rating: 4.5 out of 5
(1 rating)
2,121 students
3 hours on-demand video
1 article
4 downloadable resources
Description
Welcome to the "mastering Linux Privilege Escalation" Beginner to Advanced course! In this hands-on learning journey, you will master the art of privilege escalation in Linux, covering the entire spectrum from beginner to advanced levels. This course is designed to equip you with a various range of techniques to effectively escalate your privileges on Linux systems.
Throughout the course, we will explore various aspects of Linux security and delve into the intricacies of privilege escalation. You will learn how to identify potential vulnerabilities in file permissions, user management, and system configurations. From there, we will progress to more advanced topics, such as exploiting kernel vulnerabilities and bypassing security mechanisms like passsword on file, SSH keys, kernal exploit, file permissions, sudo rights, SUDO rights , suid binaries, linux capabilities, Network File System, LXD containers, and Cron jobs
https://www.udemy.com/course/mastering-linux-privilege-escalation/?couponCode=B7B693AA5243B515DBBE
Enjoy!
Learn Linux Privilege Escalation beginner to advanced Level
New
Rating: 4.5 out of 5
(1 rating)
2,121 students
3 hours on-demand video
1 article
4 downloadable resources
Description
Welcome to the "mastering Linux Privilege Escalation" Beginner to Advanced course! In this hands-on learning journey, you will master the art of privilege escalation in Linux, covering the entire spectrum from beginner to advanced levels. This course is designed to equip you with a various range of techniques to effectively escalate your privileges on Linux systems.
Throughout the course, we will explore various aspects of Linux security and delve into the intricacies of privilege escalation. You will learn how to identify potential vulnerabilities in file permissions, user management, and system configurations. From there, we will progress to more advanced topics, such as exploiting kernel vulnerabilities and bypassing security mechanisms like passsword on file, SSH keys, kernal exploit, file permissions, sudo rights, SUDO rights , suid binaries, linux capabilities, Network File System, LXD containers, and Cron jobs
https://www.udemy.com/course/mastering-linux-privilege-escalation/?couponCode=B7B693AA5243B515DBBE
Enjoy!