143$

14$




Review
    (0)

    5/0.0

Categories
Cyber Security

Overview

  • Quizzes Yes
  • Skill level Beginner
  • Language Bangla
  • Duration 02:52:36 H
  • Total Enrollments: 5

Course Description

Linux for Ethical Hackers & Privilege Escalation is a comprehensive course designed to teach participants the techniques and strategies used by attackers to exploit vulnerabilities in Linux systems. This course is aimed at IT security professionals, system administrators, and ethical hackers who are interested in learning how to assess the security of Linux systems and identify misconfigurations that can lead to privilege escalation.

Throughout the course, students will learn how to enumerate Linux systems, identify potential attack vectors, and use various tools and techniques to escalate privileges and achieve root access. The course covers topics such as:

  • Understanding the Linux operating system and its security mechanisms
  • Enumerating Linux systems to identify potential vulnerabilities and misconfigurations
  • Exploiting vulnerabilities and escalating privileges through various techniques, including buffer overflows, privilege escalation exploits, and more
  • Using various tools and scripts to automate the privilege escalation process
  • Best practices for securing Linux systems and preventing privilege escalation attacks

By the end of the course, students will have a thorough understanding of Linux security and will be able to identify and exploit misconfigurations to gain elevated privileges. This knowledge will be useful for security assessments, penetration testing, and for improving the security of their own Linux systems.

Certification

Yes

Learning Outcomes

    The learning outcomes for the Linux for Ethical Hackers & Privilege Escalation course include:

    1. Understanding of the Linux operating system and its security mechanisms
    2. Ability to enumerate Linux systems to identify potential vulnerabilities and misconfigurations
    3. Knowledge of various techniques for exploiting vulnerabilities and escalating privileges, including buffer overflows, privilege escalation exploits, and more
    4. Proficiency in using tools and scripts to automate the privilege escalation process
    5. Awareness of best practices for securing Linux systems and preventing privilege escalation attacks
    6. Ability to conduct security assessments and penetration testing on Linux systems
    7. Ability to improve the security of their own Linux systems by identifying and mitigating potential vulnerabilities
    8. Understanding of the importance of ethical hacking and the role it plays in maintaining the security of IT systems.

    By achieving these learning outcomes, students will have the skills and knowledge necessary to identify and exploit misconfigurations in Linux systems, escalate privileges, and improve the security of their own systems.

Curriculum

Introduction

    Introduction

Lab Setup

    Installing Virtual Box
    Installing Kali Linux VM as Attacker Machine
    Installing Debian VM as Compromised System
    Lab Overview

Linux Essentials

    Linux Command Shortcut
    Linux Basic Command: Part 2
    Linux Ownership
    Linux Basic Command: Part 1
    Linux Permission
    Linux: grep~ pipe

Linux Privilege Escalation

    21 bckgrnd-concept-suid-sgid
    22 linux-PrivEscal-suid-known-exploit
    Linux-PrivEscal-suid-shared-object-inject
    Linux-PrivEscal-suid-abusing-shell-function
    Linux-PrivEscal-suid-abusing-shell-function#2
    Linux Privilege Escalation Introduction
    Linux Privilege Escalation Strategy
    Linux-PrivEscal-sudo-shell-escape and find
    15 linux-PrivEscal-sudo-intended-functionality
    16 linux-PrivEscal-sudo-env-variable
    17 bckgrnd-concept-crontab-path-env
    18 linux-PrivEscal-cron-file-permission
    19 linux-PrivEscal-cron-path-variable
    20 linux-PrivEscal-cron-wildcard
    26 linux-PrivEscal-password-mining-history
    27 linux-PrivEscal-password-mining-config
    28 linux-PrivEscal-password-mining-ssh
    29 bckgrnd-concept-readable-writable
    30 linux-PrivEscal-file-permission-readable-shadow
    31 linux-PrivEscal-file-permission-writeable-shadow
    32 linux-PrivEscal-file-permission-writeable-passwdw
    Kernel Exploits
    Linux Privilege Escalation Scripts
    Conclusion




FAQ



Instructor

Reviews

Write your own review

 
Rating