Linux Red Team Privilege Escalation Techniques - Kernel Exploits & SUDO Permissions

preview_player
Показать описание
In this video, I explore the process of elevating privileges on Linux by leveraging kernel exploits, local accounts, and misconfigured SUDO permissions.

Privilege Escalation consists of techniques adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with unprivileged access but require elevated permissions to follow through on their objectives. Common approaches are to take advantage of system weaknesses, misconfigurations, and vulnerabilities.

//PLATFORMS

//SOCIAL NETWORKS

//BOOKS

//SUPPORT THE CHANNEL

//CYBERTALK PODCAST

//WE VALUE YOUR FEEDBACK
We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.

//THANK YOU!
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة

-----------------------------------------------------------------------------------
#redteaming #cybersecurity #pentesting
Рекомендации по теме
Комментарии
Автор

youre honestly the best, to provide all this information for public availability. not all heroes wear capes. <3

tyronemagnus
Автор

here in Brazil we thank you for your dedication and excellent channel 🇧🇷🇧🇷✨

passaronegro
Автор

Another great lesson! We'll wait for part 2 with Cron Jobs/Services techniques!
Thank u Sensei! 🙏

korovamilkplus
Автор

you are video is great, i learn many more

gw
Автор

We need a pivoting guide sir with and without metasploit

Lots of love from Indians

RX_.
Автор

Kali machine's theme and terminal is very nice. How can I do like yours

omerfarukbilgiseven
Автор

Where's the documentation for this video?

nssatomic
Автор

Surf on the redteaming wave when this is pentesting stuff :)

trustedsecurity
Автор

Sir why you delete or make private your some videos?

orbitxyz
Автор

Windows exploits vs Linux is like recruit difficulty vs veteran

RealCyberCrime
Автор

Linux exploits is way ez then window cause most people who use Linux don’t know how to boost defense on there system while windows you have to ev antivirus and windows defender

xwxe
Автор

always so don't know a single experienced linux user you could perform this attack on. No way a regular user gets sudo permissions without password prompt to run Python as root. Just like most of the "hacking" tuts it's contrived bullshit.

davidyanceyjr
Автор

grep --color=auto -rnw '/var/ww/html' -ie "PASSWORD" --color=always 2> /dev/null


From where hackers get this type of command. What do people have to learn to get this type of commands in their head? HOW?

websterghoul