Course Overview

This course focuses on Linux Privilege Escalation tactics and techniques designed to help you improve your privilege escalation game. Students should take this course if they are interested in:

  • Gaining a better understanding of privilege escalation techniques
  • Improving Capture the Flag skillset
  • Preparing for certifications such as the OSCP, eCPPT, CEH, etc.

Requirements

  • Prior beginner hacking knowledge preferred
  • Prior virtualization knowledge preferred
  • Access to a Windows machine is preferred

What will I learn?

1) How to enumerate Linux systems manually and with tools

2) A multitude of privilege escalation techniques, including:

  • Kernel Exploits
  • Password Hunting
  • File Permissions
  • Sudo Attacks
  • Shell Escaping
  • Intended Functionality
  • LD_PRELOAD
  • CVE-2019-14287
  • CVE-2019-18634
  • SUID Attacks
  • Shared Object Injection
  • Binary Symlinks
  • Environment Variables
  • Capabilities Attacks
  • Scheduled Tasks
  • NFS
  • Docker

3) Tons of hands-on experience, including:

  • 11 vulnerable machines total
  • Capstone challenge
  • Custom lab with no installation required


Deo Martinez

"Heath does a great job explaining the concepts of pen testing and follows it up with hands-on examples. Its easy to follow his methodology and he gives plenty of advice on some of the common tools to use based on the findings illustrated in his course. Great job, Heath!"

Jacob Surles

"This course is amazing. I have taken other privilege escalation courses and none of them were even close to as engaging and informative as this course. I highly recommend this course."

Florin Galaftion

"Excellent ! The Combo Windows/Linux privilege escalation courses was a great investment. Worth every penny and more! The CTFs were well chosen and included a full walk-thru of the techniques presented in lectures. Way to go Heath ! Looking for more coming from you in the near future !"

Course Curriculum - 6.5 Hours


  Introduction
Available in days
days after you enroll
  Lab Overview & Initial Access
Available in days
days after you enroll
  Initial Enumeration
Available in days
days after you enroll
  Exploring Automated Tools
Available in days
days after you enroll
  Escalation Path: Kernel Exploits
Available in days
days after you enroll
  Escalation Path: Passwords & File Permissions
Available in days
days after you enroll
  Escalation Path: Sudo
Available in days
days after you enroll
  Escalation Path: SUID
Available in days
days after you enroll
  Escalation Path: Other SUID Escalation
Available in days
days after you enroll
  Escalation Path: Capabilities
Available in days
days after you enroll
  Escalation Path: Scheduled Tasks
Available in days
days after you enroll
  Escalation Path: NFS Root Squashing
Available in days
days after you enroll
  Escalation Path: Docker
Available in days
days after you enroll
  Capstone Challenge
Available in days
days after you enroll
  Wrapping Up
Available in days
days after you enroll

Choose a Pricing Option

$29.99

Linux Privilege Escalation for Beginners

Learn how to escalate privileges on Linux machines with absolutely no filler.

This course focuses on Linux Privilege Escalation tactics and techniques designed to help you improve your privilege escalation game. Students should take this course if they are interested in:

  • Gaining a better understanding of privilege escalation techniques
  • Improving Capture the Flag skillset
  • Preparing for certifications such as the OSCP, eCPPT, CEH, etc.


What will I learn?

1) How to enumerate Linux systems manually and with tools

2) A multitude of privilege escalation techniques, including:

  • Kernel Exploits
  • Password Hunting
  • File Permissions
  • Sudo Attacks
  • Shell Escaping
  • Intended Functionality
  • LD_PRELOAD
  • CVE-2019-14287
  • CVE-2019-18634
  • SUID Attacks
  • Shared Object Injection
  • Binary Symlinks
  • Environment Variables
  • Capabilities Attacks
  • Scheduled Tasks
  • NFS
  • Docker


3) Tons of hands-on experience, including:

  • 11 vulnerable machines total
  • Capstone challenge
  • Custom lab with no installation required


About the Instructor


Hi everyone! My name is Heath Adams, but I also go by "The Cyber Mentor" on social media. I am the founder and CEO of TCM Security, an ethical hacking and cybersecurity consulting company. While I am an ethical hacker by trade, I love to teach! I have taught courses to over 170,000 students on multiple platforms, including Udemy, YouTube, Twitch, and INE.

I am currently OSCP, OSWP, eCPPTX, eWPT, CEH, Pentest+, CCNA, Linux+, Security+, Network+, and A+ certified. 

I'm also a husband, animal dad, tinkerer, and military veteran. I hope you enjoy my courses.


Follow Heath on Social Media:

LinkedIn - https://linkedin.com/in/heathadams

Twitter - https://twitter.com/thecybermentor

YouTube - https://youtube.com/c/thecybermentor

Twitch - https://twitch.tv/thecybermentor