Linux Red Team Privilege Escalation Techniques - Kernel Exploits and SUDO Permissions
HackerSploit via YouTube
Start speaking a new language. It’s just 3 weeks away.
Launch a New Career with Certificates from Google, IBM & Microsoft
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the process of elevating privileges on Linux systems through kernel exploits, local accounts, and misconfigured SUDO permissions in this 41-minute video tutorial. Learn about privilege escalation techniques used by adversaries to gain higher-level permissions on systems and networks. Discover common approaches for taking advantage of system weaknesses, misconfigurations, and vulnerabilities. Gain insights into red team tactics for Linux privilege escalation, focusing on kernel exploits and SUDO permission abuse. Enhance your understanding of cybersecurity and penetration testing methodologies to better protect against and identify potential security threats in Linux environments.
Syllabus
Linux Red Team Privilege Escalation Techniques - Kernel Exploits & SUDO Permissions
Taught by
HackerSploit