Module 17: Linux Privilege Escalation
Enumerating Linux
Understanding Files and Users Privileges on Linux
Manual Enumeration
Automated Enumeration
Exposed Confidential Information
Inspecting User Trails
Inspecting Service Footprints
Insecure File Permissions
Abusing Cron Jobs
Abusing Password Authentication
Insecure System Components
Abusing Setuid Binaries and Capabilities
Abusing Sudo
Exploiting Kernel Vulnerabilities
Last updated
