Privilege Escalation

Course Overview

This course is designed to provide a comprehensive understanding of privilege escalation techniques in Linux environments. You’ll explore various privilege escalation methods and gain hands-on experience with essential tools. By the end of this course, you’ll have the skills to identify and exploit common privilege escalation vulnerabilities in Linux systems.

Course Outline

  1. Introduction to Privilege Escalation

    • Understanding UID/GID concepts

    • Root shells and reverse shells

    • Overview of privilege escalation importance in cybersecurity

  2. Linux Fundamentals for Privilege Escalation

    • Basic Linux commands and shell usage

    • Linux permission model

  3. Privilege Escalation Tools

    • Introduction to Linux Smart Enumeration (LSE)

    • Using LinEnum for system enumeration

    • Other popular enumeration and privilege escalation tools

  4. Kernel Exploits

    • Understanding kernel vulnerabilities

    • Case study: DirtyCow exploit

  5. Service Exploits

    • Identifying vulnerable services

    • Example: Exploiting CVE-2016-1531

  6. File Permission Based Attacks

    • Weak file permissions

    • Exploiting misconfigured backup files

    • Using Google dorks for information gathering

  7. Sudo Misconfigurations

    • Understanding sudo and its security implications

    • Exploiting sudo rights

  8. Cron Job Exploitation

    • Introduction to cron jobs

    • Identifying and exploiting vulnerable cron jobs

  9. SUID/SGID Binary Exploitation

    • Understanding SUID and SGID permissions

    • Identifying and exploiting SUID/SGID binaries

And More!

By the end of this course, you will be able to:

  • Understand the fundamental concepts of Linux permissions and privilege escalation

  • Use various tools to enumerate Linux systems for vulnerabilities

  • Identify and exploit kernel and service vulnerabilities

  • Leverage misconfigurations in file permissions, sudo, cron jobs, and SUID/SGID binaries

Prerequisites:

  • Basic understanding of Linux

  • Familiarity with Linux permissions

  • Ability to use a Linux shell