Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Linux Privilege Escalation Techniques - Red Team Series

Linode via YouTube

Overview

The course covers Linux privilege escalation techniques, including obtaining root access, exploiting permissions or binaries, and using kernel exploits. The teaching method includes video tutorials with practical demonstrations. The course is intended for individuals interested in cybersecurity, ethical hacking, and red team operations.

Syllabus

Introduction
What We’ll Be Covering
Linux Privilege Escalation Techniques
MITRE Attack Privilege Escalation Techniques
Techniques You Should Follow
How to Obtain Root Access
How to Exploit SUID Binaries / SUDO Permissions
How to Use a Kernel Exploit
How to Transfer the Exploit to the Target
How Does the Exploit Work?
How to Execute the Exploit
Conclusion

Taught by

Linode

Reviews

Start your review of Linux Privilege Escalation Techniques - Red Team Series

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.