Easy Learning with Escalada de Privilegios en Linux - Hacking Ético
IT & Software > Network & Security
4 h
£19.99 Free for 3 days
4.5
35825 students

Enroll Now

Language: Spanish

Sale Ends: 22 Mar

Mastering Linux Privilege Escalation: Ethical Hacking Techniques

What you will learn:

  • Master Linux privilege escalation methodologies
  • Exploit Sudo vulnerabilities
  • Exploit SUID vulnerabilities
  • Exploit Linux kernel vulnerabilities
  • Crack Linux passwords using effective techniques
  • Complete Capture The Flag (CTF) challenges
  • Utilize vulnerability analysis tools

Description

Elevate your cybersecurity skills with our comprehensive Linux Privilege Escalation course!

This course provides hands-on training in gaining elevated privileges on Linux systems using the Kali Linux environment. You'll learn to exploit vulnerabilities and master post-exploitation techniques to achieve root access.

We'll cover essential methods including exploiting SUDO and SUID vulnerabilities, kernel exploits, password cracking, and other privilege escalation strategies. Throughout the course, you will tackle realistic challenges using Capture the Flag (CTF) exercises.

Gain practical experience by applying ethical hacking techniques in real-world scenarios. Master the methodology of Linux privilege escalation and enhance your cybersecurity expertise.

This course is perfect for aspiring cybersecurity professionals and ethical hackers looking to develop advanced penetration testing skills. Discover how attackers leverage security flaws to elevate their privileges, and learn how to prevent such attacks.

Upon completion, you'll be equipped to apply your knowledge in penetration testing, security assessments, and other cybersecurity roles.

Course Structure:

  1. Introduction to Ethical Hacking and Privilege Escalation
  2. Setting Up Your Kali Linux Environment
  3. Fundamentals of Linux Privilege Escalation
  4. Exploiting Kernel Vulnerabilities for Privilege Escalation
  5. Mastering Sudo Exploitation Techniques
  6. Exploiting SUID Binaries for Privilege Escalation
  7. Advanced Privilege Escalation: Cron Jobs & Exposed Keys
  8. Leveraging NFS for Privilege Escalation
  9. Password Cracking & Weak Permissions Exploitation
  10. Essential Privilege Escalation Tools (GTFOBins, linpeas)
  11. Hands-on CTF Challenges: Real-world Scenarios

Join this course to boost your ethical hacking and cybersecurity career. See you inside!

Your instructor: Thiago Araujo

Curriculum

Introduction

This introductory section sets the stage for the course, covering the essential concepts and overview of privilege escalation in Linux systems. The lecture includes an introduction to the course and ethical hacking concepts.

Setting Up Your Kali Linux Environment

This section guides you through the setup process for your virtual environment using VirtualBox and Kali Linux. It covers Kali installation, fundamental Linux commands, and troubleshooting common installation errors. Lectures include: Installation of Virtual Box, Installation of Kali Linux, Basic Linux commands, and common errors.

Fundamentals of Linux Privilege Escalation

This section provides a comprehensive overview of Linux privilege escalation techniques. The module starts with a clear explanation of what privilege escalation is and its significance in cybersecurity.

Exploiting Kernel Vulnerabilities

This section dives deep into leveraging kernel vulnerabilities to gain elevated privileges. The main focus is on exploiting kernel vulnerabilities using various penetration testing techniques.

Mastering Sudo Exploitation

This section focuses on exploiting Sudo misconfigurations to achieve root access. You'll learn how to identify and exploit weak sudo configurations.

Exploiting SUID Binaries

This section teaches you how to identify and exploit setuid (SUID) binaries to gain escalated privileges on a Linux system. This section is highly hands-on and practical.

Advanced Privilege Escalation Techniques

This section explores advanced techniques, including exploiting vulnerabilities through Cron Jobs, exposed keys, and NFS misconfigurations.

Password Cracking & Weak Permissions

This section covers password cracking techniques using tools like John the Ripper and addresses situations with weak permissions that can be exploited to gain higher privileges.

Essential Privilege Escalation Tools

This section introduces and demonstrates two crucial tools for privilege escalation: GTFOBins and linpeas, providing a practical approach to using them effectively.

Hands-on CTF Challenges

This section provides real-world experience through a series of Capture the Flag (CTF) challenges. You'll gain practical experience by applying the techniques learned throughout the course to various vulnerable machines (TryHackMe: Escalate_My_Privileges, metasploitable2, LFI, rootme, Tomghost, Lazyadmin, Anonymous, Kiba).

Bonus Material

This bonus section contains additional information and resources to enhance your understanding of the material. This includes extra tips and tricks.

Deal Source: real.discount