HOME > IT & Software > The Complete Linux Privilege Escalation Course

The Complete Linux Privilege Escalation Course

SynopsisThe Complete Linux Privilege Escalation Course, available at...
The Complete Linux Privilege Escalation Course  No.1

The Complete Linux Privilege Escalation Course, available at $49.99, has an average rating of 4.25, with 29 lectures, based on 45 reviews, and has 390 subscribers.

You will learn about Learn Privilege Escalation with File Permissions Learn Privilege Escalation with Sudo Bypass Learn Privilege Escalation with Cron Jobs Learn Privilege Escalation with Passwords on Files Learn Privilege Escalation with LXD Learn Privilege Escalation with NFS Learn Privilege Escalation with Kernel Exploits Learn Privilege Escalation with SUID/SGID Executables Learn Privilege Escalation with Tools Learn how to use the TryHackMe Platform This course is ideal for individuals who are People who are taking the OSCP exam or Ethical Hackers or Penetration Testers It is particularly useful for People who are taking the OSCP exam or Ethical Hackers or Penetration Testers.

Enroll now: The Complete Linux Privilege Escalation Course

Summary

Title: The Complete Linux Privilege Escalation Course

Price: $49.99

Average Rating: 4.25

Number of Lectures: 29

Number of Published Lectures: 29

Number of Curriculum Items: 29

Number of Published Curriculum Objects: 29

Original Price: 19.99

Quality Status: approved

Status: Live

What You Will Learn

  • Learn Privilege Escalation with File Permissions
  • Learn Privilege Escalation with Sudo Bypass
  • Learn Privilege Escalation with Cron Jobs
  • Learn Privilege Escalation with Passwords on Files
  • Learn Privilege Escalation with LXD
  • Learn Privilege Escalation with NFS
  • Learn Privilege Escalation with Kernel Exploits
  • Learn Privilege Escalation with SUID/SGID Executables
  • Learn Privilege Escalation with Tools
  • Learn how to use the TryHackMe Platform
  • Who Should Attend

  • People who are taking the OSCP exam
  • Ethical Hackers
  • Penetration Testers
  • Target Audiences

  • People who are taking the OSCP exam
  • Ethical Hackers
  • Penetration Testers
  • Hello and welcome to this course!

    This course requires no background on Linux Privilege Escalation. You will go from beginner to advanced in just a couple of hours. We will first focus on the theory and make sure we fully understand it before moving to practical examples.

    This course comes with a FREEonline privilege escalation hacking lab to practice what you learn throughout the course. We have structured the course in a way that the student will learn Linux Privilege Escalation effectively through practice. That is why we designed and created our own lab to share with our students free of charge.

    You will learn Linux Privilege Escalation with:

  • File Permissions

  • Sudo Bypass

  • Cron Jobs

  • Passwords on Files

  • LXD Linux Container

  • Network File System (NFS)

  • Kernel Exploits

  • SUID/SGID Executables

  • Automatic tools

  • All of these topics will be covered in detail.

    By the end of this course, you will have completely mastered the fundamentals of Linux Privilege Escalation and you will also be able to confidently take on any Linux privilege escalation challenge either on a CTF competition, an exam or in a real-life scenario.

    If you ever have any questions related to the course content please create a thread from the QnA section and describe your issue, and we will try to answer as soon as possible!

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Cource Overview

    Chapter 2: How to practise

    Lecture 1: Creating a TryHackMe Account

    Lecture 2: Accessing our Virtual Hacking Lab

    Lecture 3: Understanding the TryHackMe Network

    Chapter 3: File Permissions

    Lecture 1: Linux File Permissions

    Lecture 2: Exploiting the passwd file

    Lecture 3: Exploiting the shadow file

    Chapter 4: Sudo Bypass

    Lecture 1: What is Sudo Bypass?

    Lecture 2: Shell Escape Sequences

    Lecture 3: Environment Variables

    Chapter 5: Cron Jobs

    Lecture 1: What are CronJobs?

    Lecture 2: File Permissions

    Lecture 3: PATH Environment Variables

    Lecture 4: Wildcard Injection

    Chapter 6: Passwords on Files

    Lecture 1: History Files

    Lecture 2: Configuration Files

    Chapter 7: LXD Linux Containers

    Lecture 1: What is LXD?

    Lecture 2: How to exploit LXD

    Chapter 8: Network File System (NFS)

    Lecture 1: What is NFS?

    Lecture 2: Identifying Vulnerable NFS Shares

    Lecture 3: Exploiting Vulnerable NFS Shares

    Chapter 9: Kernel Exploits

    Lecture 1: What are Kernel Exploits

    Lecture 2: Exploiting Linux using DirtyCow

    Chapter 10: SUID/SGID Executables

    Lecture 1: What is SUID/SGID?

    Lecture 2: Identifying SUID Vulnerabilities

    Lecture 3: Exploiting SUID

    Chapter 11: Usefull Tools

    Lecture 1: Tools For Linux PrivEsc

    Lecture 2: LinPEAS

    Lecture 3: GTFONow

    Instructors

  • The Complete Linux Privilege Escalation Course  No.2
    Hack Academy
    Cyber Security Training Company
  • The Complete Linux Privilege Escalation Course  No.3
    Dimitris Kalopisis
    CEO at Hack-Academy
  • Rating Distribution

  • 1 stars: 1 votes
  • 2 stars: 2 votes
  • 3 stars: 3 votes
  • 4 stars: 7 votes
  • 5 stars: 32 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!