HOME > IT & Software > Linux Privilege Escalation for OSCP Beyond!

Linux Privilege Escalation for OSCP Beyond!

SynopsisLinux Privilege Escalation for OSCP & Beyond!, available...
Linux Privilege Escalation for OSCP Beyond!  No.1

Linux Privilege Escalation for OSCP & Beyond!, available at $19.99, has an average rating of 4.85, with 14 lectures, based on 3391 reviews, and has 11410 subscribers.

You will learn about Multiple methods for escalating privileges on a Linux system. In depth explanations of why and how these methods work. Tools which can help identify potential privilege escalation vulnerabilities on a Linux system. A free intentionally vulnerable Debian Linux VM to practice privilege escalation on. This course is ideal for individuals who are Beginner and intermediate ethical hackers. or Students currently taking or planning to take the PWK/OSCP course. It is particularly useful for Beginner and intermediate ethical hackers. or Students currently taking or planning to take the PWK/OSCP course.

Enroll now: Linux Privilege Escalation for OSCP & Beyond!

Summary

Title: Linux Privilege Escalation for OSCP & Beyond!

Price: $19.99

Average Rating: 4.85

Number of Lectures: 14

Number of Published Lectures: 14

Number of Curriculum Items: 14

Number of Published Curriculum Objects: 14

Original Price: $19.99

Quality Status: approved

Status: Live

What You Will Learn

  • Multiple methods for escalating privileges on a Linux system.
  • In depth explanations of why and how these methods work.
  • Tools which can help identify potential privilege escalation vulnerabilities on a Linux system.
  • A free intentionally vulnerable Debian Linux VM to practice privilege escalation on.
  • Who Should Attend

  • Beginner and intermediate ethical hackers.
  • Students currently taking or planning to take the PWK/OSCP course.
  • Target Audiences

  • Beginner and intermediate ethical hackers.
  • Students currently taking or planning to take the PWK/OSCP course.
  • This course teaches privilege escalation in Linux, from basics such as how permissions work, to in-depth coverage and demonstrations of actual privilege escalation techniques. The course comes with a full set of slides (170+), and an intentionally misconfigured Debian VM which can be used by students to practice their own privilege escalation.

    Please note that this course is aimed at students currently taking, or planning to take the OSCP, and thus covers more common forms of privilege escalation. Some extra methods are included, and more methods may be added in the future, however this course was not designed to cover every possible (or obscure) method.

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Introduction

    Lecture 2: Privilege Escalation in Linux

    Lecture 3: Understanding Permissions in Linux

    Lecture 4: Spawning Root Shells

    Lecture 5: Privilege Escalation Tools

    Chapter 2: Privilege Escalation Techniques

    Lecture 1: Kernel Exploits

    Lecture 2: Service Exploits

    Lecture 3: Weak File Permissions

    Lecture 4: Sudo

    Lecture 5: Cron Jobs

    Lecture 6: SUID / SGID Executables

    Lecture 7: Passwords & Keys

    Lecture 8: NFS

    Chapter 3: Conclusions

    Lecture 1: Privilege Escalation Strategy

    Instructors

  • Linux Privilege Escalation for OSCP Beyond!  No.2
    Tib3rius ?
    Penetration Tester
  • Rating Distribution

  • 1 stars: 10 votes
  • 2 stars: 26 votes
  • 3 stars: 153 votes
  • 4 stars: 834 votes
  • 5 stars: 2368 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!