Linux Privilege Escalation for Beginners
0:00 – Overview
1:46 – Course Introduction
9:54 – Course Tips & Resources
15:50 – Gaining a Foothold: Intro and Shell Access
23:13 – System Enumeration
29:28 – User Enumeration
34:27 – Network Enumeration
38:43 – Password Enumeration
44:41 – Automated Tools Intro
49:28 – Exploring Automated Tools
1:01:16 – Kernel Exploits Overview
1:04:45 – Escalation via Kernel Exploits
1:10:55 – Passwords and File Permissions Overview
1:11:37 – Escalation via Stored Passwords
1:20:14 – Escalation via Weak File Permissions
1:30:58 – Escalation via SSH Keys
1:36:45 – Sudo Overview
1:38:07 – Escalation via Sudo Shell Escaping
1:44:54 – Escalation via Intended Functionality
1:49:41 – Escalation via LD_PRELOAD
1:56:50 – Challenge Overview
1:58:16 – Challenge Walkthrough
2:11:07 – CVE-2019-14287 Overview
2:14:30 – Escalation via CVE-2019-14287
2:17:12 – Overview and Escalation via CVE-2019-18634
2:24:02 – SUID Overview
2:32:31 – Gaining a Foothold
2:45:41 – Escalation via SUID
2:52:23 – Conclusion
Full course: https://academy.tcm-sec.com/p/linux-privilege-escalation
Pentests & Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com
Sponsorship Inquiries: info@thecybermentor.com
📱Social Media📱
___________________________________________
Twitter: https://twitter.com/thecybermentor
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://instagram.com/thecybermentor
LinkedIn: https://www.linkedin.com/in/heathadams
TikTok: https://tiktok.com/@thecybermentor
Discord: https://discord.gg/tcm
💸Donate💸
___________________________________________
Like the channel? Please consider supporting me on Patreon:
https://www.patreon.com/thecybermentor
Support the stream (one-time): https://streamlabs.com/thecybermentor
Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker’s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Social Engineering: The Science of Human Hacking: https://amzn.to/31HAmVx
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://amzn.to/2V9GpQk
My Build:
lg 32gk850g-b 32″ Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d1UW1
EVGA 2080TI: https://amzn.to/30d2lj7
MSI Z390 MotherBoard: https://amzn.to/30eu5TL
Intel 9700K: https://amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: https://amzn.to/2M638Zb
Razer Nommo Chroma Speakers: https://amzn.to/30bWjiK
Razer BlackWidow Chroma Keyboard: https://amzn.to/2V7A0or
CORSAIR Pro RBG Gaming Mouse: https://amzn.to/30hvg4P
Sennheiser RS 175 RF Wireless Headphones: https://amzn.to/31MOgpu
My Recording Equipment:
Panasonic G85 4K Camera: https://amzn.to/2Mk9vsf
Logitech C922x Pro Webcam: https://amzn.to/2LIRxAp
Aston Origin Microphone: https://amzn.to/2LFtNNE
Rode VideoMicro: https://amzn.to/309yLKH
Mackie PROFX8V2 Mixer: https://amzn.to/31HKOMB
Elgato Cam Link 4K: https://amzn.to/2QlicYx
Elgate Stream Deck: https://amzn.to/2OlchA5
*We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.
Views : 21085
linux