Sign in to confirm you’re not a bot
This helps protect our community. Learn more
Linux Privilege Escalation Techniques | Red Team Series 9-13
136Likes
9,402Views
2022May 2
In this video in our ‪@HackerSploit‬ Red Team Series, we will cover Linux privilege escalation techniques. This includes obtaining root access, and exploiting permissions or binaries to achieve access. Chapters: 0:00 Introduction 0:35 What We’ll Be Covering 1:00 Linux Privilege Escalation Techniques 4:00 MITRE Attack Privilege Escalation Techniques 5:12 Techniques You Should Follow 15:36 How to Obtain Root Access 19:22 How to Exploit SUID Binaries / SUDO Permissions 22:25 How to Use a Kernel Exploit 27:45 How to Transfer the Exploit to the Target 32:26 How Does the Exploit Work? 34:48 How to Execute the Exploit 38:43 Conclusion New to Cloud Computing? Get started here with a $100 credit → https://www.linode.com/linodetube Read the doc for more information on the Hackersploit Red Team Series → https://www.linode.com/docs/guides/ha... Learn more about Linux Privilege Escalation Techniques → https://www.linode.com/docs/guides/li... Subscribe to get notified of new episodes as they come out → https://www.youtube.com/linode?sub_co... #Linode #Hackersploit #Security #RedTeam ; @HackerSploit

Follow along using the transcript.

Akamai Developer

1.04M subscribers