
This module covers a wide variety of techniques that can be utilized to escalate privileges on Linux systems.
- Enumerating a Linux system
- Kernel exploits
- Exploiting vulnerable services
- Abusing misconfigurations and permissions issues
- Hunting for credentials
- Shared object hijacking and leveraging shared libraries
- Taking advantage of a privileged group membership
- One-off context-dependent techniques
- Linux security hardening best practices
The final assessment was fun 😛
also, Obsidian is getting bigger…