Linux Privilege Escalation Techniques | Red Team Series 9-13

preview_player
Показать описание
In this video in our @HackerSploit Red Team Series, we will cover Linux privilege escalation techniques. This includes obtaining root access, and exploiting permissions or binaries to achieve access.

Chapters:
0:00 Introduction
0:35 What We’ll Be Covering
1:00 Linux Privilege Escalation Techniques
4:00 MITRE Attack Privilege Escalation Techniques
5:12 Techniques You Should Follow
15:36 How to Obtain Root Access
19:22 How to Exploit SUID Binaries / SUDO Permissions
22:25 How to Use a Kernel Exploit
27:45 How to Transfer the Exploit to the Target
32:26 How Does the Exploit Work?
34:48 How to Execute the Exploit
38:43 Conclusion

#Linode #Hackersploit #Security #RedTeam ; @HackerSploit
Рекомендации по теме
Комментарии
Автор

Thank you so much for this video, just gave me a new perspective to make a linux kernel exploitation with dirtycow, and finally worked.

matys
Автор

what about login like from main menu i guess not in the shell such as username and password

reconxf