This course teaches privilege escalation in Linux, from basics such as how permissions work, to in-depth coverage and demonstrations of actual privilege escalation techniques. The course comes with a full set of slides (170+), and an intentionally misconfigured Debian VM which can be used by students to practice their own privilege escalation.
This course teaches privilege escalation in Linux, from basics such as how permissions work, to in-depth coverage and demonstrations of actual privilege escalation techniques. The course comes with a full set of slides (170+), and an intentionally misconfigured Debian VM which can be used by students to practice their own privilege escalation.
Please note that this course is aimed at students currently taking, or planning to take the OSCP, and thus covers more common forms of privilege escalation. Some extra methods are included, and more methods may be added in the future, however this course was not designed to cover every possible (or obscure) method.
An introduction to your lecturer and what the course covers, as well as setting up the practice Debian VM. The VM is provided as a downloadable material in this lecture, as are the full slides for the entire course. These slides contain all the information from the video lectures, as well as step-by-step instructions for performing the privilege escalations.
A brief summary of what we mean by privilege escalation in the context of Linux systems.
An in-depth look at how Linux handles permissions, which is essential to understanding how to escalate privileges.
A few ways to spawn root shells in Linux, all of which will make an appearance in the course.
An overview and demo of two popular privilege escalation enumeration tools for Linux.
A look at Linux Kernel exploits and a demo of the Dirty Cow exploit that can be used to spawn a root shell.
An overview of service exploits which can lead to root, as well as a demo of a complicated MySQL exploit.
Multiple methods for exploiting weak file permissions in order to escalate privileges in Linux.
A look at a number of misconfigurations in the Sudo command which can lead to privilege escalation.
Exploiting weaknesses in cron jobs to execute commands with root privileges.
A detailed look into SUID and SGID executable files that includes several methods for discovering and exploiting weaknesses to gain elevated privileges.
Common locations to look for passwords and keys that may allow you to log in as the root user.
An overview of NFS and a dangerous misconfiguration which lets you create files as the root user.
A brief discussion about privilege escalation strategy to end the course.
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.