Linux PrivEsc course completed

This module covers a wide variety of techniques that can be utilized to escalate privileges on Linux systems.

  • Enumerating a Linux system
  • Kernel exploits
  • Exploiting vulnerable services
  • Abusing misconfigurations and permissions issues
  • Hunting for credentials
  • Shared object hijacking and leveraging shared libraries
  • Taking advantage of a privileged group membership
  • One-off context-dependent techniques
  • Linux security hardening best practices

The final assessment was fun 😛

also, Obsidian is getting bigger…


Posted

in

by

Tags: