We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Privilege Escalation with PEASS-NG

Rishalin Pillay

Adversaries frequently use unprivileged access to enter and browse a network, but they need privileged access to complete their tasks. In this course, you will learn privilege escalation using the PEASS-NG suite.

Read more

Adversaries frequently use unprivileged access to enter and browse a network, but they need privileged access to complete their tasks. In this course, you will learn privilege escalation using the PEASS-NG suite.

Manually looking for privilege escalation paths can become a timely activity. Sometimes you may miss misconfigurations that are easily exploitable and at times you may not be looking at all possibilities. In this course, Privilege Escalation with PEASS-NG, you’ll cover how to utilize WinPEAS and LinPEAS to execute privilege escalation in a red team environment. First, you’ll explore using LinPEAS to discover excessive permissions related to SETUID/SETGID. Next, you’ll apply WinPEAS to discover dll’s that can be exploited. Finally, you’ll simulate the task of finding valuable registry keys which enable you to install services with elevated permissions. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques [T1548.001, T1055.001, T1547.001] using the PEASS-NG suite. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.

Enroll now

What's inside

Syllabus

Course Overview
Privilege Escalation with LinPEAS
Privilege Escalation with WinPEAS
Resources
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Learns about privilege escalation using PEASS-NG
Builds on existing knowledge of privilege escalation
Provides hands-on labs for practice
May require some prior experience with privilege escalation

Save this course

Save Privilege Escalation with PEASS-NG to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Privilege Escalation with PEASS-NG. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Privilege Escalation with PEASS-NG will develop knowledge and skills that may be useful to these careers:
Data Scientist
Data Scientists use data to solve business problems. They also work to develop and implement machine learning models. This course may be useful for Data Scientists because it can help them to identify and exploit vulnerabilities in computer systems, which can be used to improve the security of their own systems.
Machine Learning Engineer
Machine Learning Engineers design, develop, and maintain machine learning models. They also work to identify and mitigate security risks. This course may be useful for Machine Learning Engineers because it can help them to identify and exploit vulnerabilities in computer systems, which can be used to improve the security of their own systems.
Software Engineer
Software Engineers design, develop, and maintain software applications. They also work to identify and mitigate security risks. This course may be useful for Software Engineers because it can help them to identify and exploit vulnerabilities in computer systems, which can be used to improve the security of their own systems.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's computer networks and systems. They also monitor and analyze security systems to identify and respond to potential threats. This course may be useful for Information Security Analysts because it can help them to identify and exploit vulnerabilities in computer systems, which can be used to improve the security of their own systems.
DevOps Engineer
DevOps Engineers work to bridge the gap between development and operations teams. They also work to automate and improve the software development process. This course may be useful for DevOps Engineers because it can help them to identify and exploit vulnerabilities in computer systems, which can be used to improve the security of their own systems.
Cloud Engineer
Cloud Engineers design, develop, and maintain cloud-based applications. They also work to identify and mitigate security risks. This course may be useful for Cloud Engineers because it can help them to identify and exploit vulnerabilities in computer systems, which can be used to improve the security of their own systems.
Systems Administrator
Systems Administrators are responsible for managing and maintaining computer systems. They also work to identify and mitigate security risks. This course may be useful for Systems Administrators because it can help them to identify and exploit vulnerabilities in computer systems, which can be used to improve the security of their own systems.
Security Analyst
Security Analysts monitor and analyze security systems to identify and respond to potential threats. They also work to develop and implement security policies and procedures. This course may be useful for Security Analysts because it can help them to identify and exploit vulnerabilities in computer systems, which can be used to improve the security of their own systems.
Network Security Engineer
Network Security Engineers are responsible for designing, implementing, and maintaining the security of computer networks. They also work to identify and mitigate security risks. This course may be useful for Network Security Engineers because it can help them to identify and exploit vulnerabilities in computer systems, which can be used to improve the security of their own systems.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. They also help organizations to develop and implement security policies and procedures. This course may be useful for Security Consultants because it can help them to identify and exploit vulnerabilities in computer systems, which can be used to improve the security of their clients' systems.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain security systems for organizations. They also work to identify and mitigate security risks. This course may be useful for Cybersecurity Engineers because it can help them to identify and exploit vulnerabilities in computer systems, which can be used to improve the security of their own systems.
Penetration Tester
Penetration Testers are responsible for testing the security of computer systems and networks. They use a variety of techniques to identify vulnerabilities that could be exploited by attackers. This course may be useful for Penetration Testers because it can help them to identify and exploit vulnerabilities in computer systems, which can be used to improve the security of their own systems.
Malware Analyst
Malware Analysts identify and analyze malware. They also work to develop and implement malware detection and prevention techniques. This course may be useful for Malware Analysts because it can help them to identify and exploit vulnerabilities in computer systems, which can be used to improve the security of their own systems.
Information Security Manager
Information Security Managers are responsible for overseeing the security of an organization's information systems. They also work to develop and implement security policies and procedures. This course may be useful for Information Security Managers because it can help them to identify and exploit vulnerabilities in computer systems, which can be used to improve the security of their own systems.
Security Researcher
Security Researchers identify and exploit vulnerabilities in computer systems. They also work to develop and implement security patches. This course may be useful for Security Researchers because it can help them to identify and exploit vulnerabilities in computer systems, which can be used to improve the security of their own systems.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Privilege Escalation with PEASS-NG.
Provides a comprehensive overview of hacking techniques, including privilege escalation. It valuable resource for anyone interested in learning more about this topic.
Provides a comprehensive overview of the Linux kernel, including privilege escalation. It valuable resource for anyone interested in learning more about this topic.
Provides a comprehensive overview of rootkits, including privilege escalation techniques. It valuable resource for anyone interested in learning more about this topic.
Provides a comprehensive overview of the Windows operating system, including privilege escalation. It valuable resource for anyone interested in learning more about this topic.
Provides a practical guide to memory forensics, including privilege escalation techniques. It valuable resource for anyone interested in learning more about this topic.
Provides a practical guide to Python programming for hackers and pentesters, including privilege escalation techniques. It valuable resource for anyone interested in learning more about this topic.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Privilege Escalation with PEASS-NG.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser