Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Training Linux Privilege Escalation
Introduction to Privilege Escalation
Understanding Privileges on Linux Systems
Introduction to Privilege Escalation
Common Techniques Used for Privilege Escalation
Enumeration and Information Gathering
System Enumeration for Privilege Escalation
User Enumeration Techniques
Service Enumeration Techniques
Exploitation Techniques
Exploiting Misconfigurations for Privilege Escalation
Exploiting Weak File Permissions
Exploiting Sudo Misconfigurations
Post-Exploitation and Persistence
Maintaining Access with Backdoors
Escalating Privileges Using Kernel Exploits
Creating Persistent Backdoors on Linux
Detection and Prevention
Detecting Privilege Escalation Attempts
Best Practices for Preventing Privilege Escalation on Linux Systems
Secure Configuration for Mitigating Privilege Escalation Risks
Introduction to Privilege Escalation
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock