This course focuses on Linux Privilege Escalation tactics and techniques designed to help you improve your privilege escalation game. Students should take this course if they are interested in:
- Gaining a better understanding of privilege escalation techniques
- Improving Capture the Flag skillset
- Preparing for certifications such as the PNPT, OSCP, eCPPT, CEH, etc.
- Prior beginner hacking knowledge preferred
- Prior virtualization knowledge preferred
- Access to a Windows machine is preferred
What will I learn?
1) How to enumerate Linux systems manually and with tools
2) A multitude of privilege escalation techniques, including:
- Kernel Exploits
- Password Hunting
- File Permissions
- Sudo Attacks
- Shell Escaping
- Intended Functionality
- SUID Attacks
- Shared Object Injection
- Binary Symlinks
- Environment Variables
- Capabilities Attacks
- Scheduled Tasks
3) Tons of hands-on experience, including:
- 11 vulnerable machines total
- Capstone challenge
- Custom lab with no installation required
"Heath does a great job explaining the concepts of pen testing and follows it up with hands-on examples. Its easy to follow his methodology and he gives plenty of advice on some of the common tools to use based on the findings illustrated in his course. Great job, Heath!"
"This course is amazing. I have taken other privilege escalation courses and none of them were even close to as engaging and informative as this course. I highly recommend this course."
"Excellent ! The Combo Windows/Linux privilege escalation courses was a great investment. Worth every penny and more! The CTFs were well chosen and included a full walk-thru of the techniques presented in lectures. Way to go Heath ! Looking for more coming from you in the near future !"
Course Curriculum - 6.5 Hours
- Sudo Overview (1:15)
- Escalation via Sudo Shell Escaping (6:39)
- Escalation via Intended Functionality (4:41)
- Escalation via LD_PRELOAD (7:01)
- Challenge Overview (1:18)
- Challenge Walkthrough (12:44)
- CVE-2019-14287 Overview (3:14)
- Escalation via CVE-2019-14287 (2:35)
- Overview and Escalation via CVE-2019-18634 (6:42)
About the Instructor
Hi everyone! My name is Heath Adams, but I also go by "The Cyber Mentor" on social media. I am the founder and CEO of TCM Security, an ethical hacking and cybersecurity consulting company. While I am an ethical hacker by trade, I love to teach! I have taught courses to over 170,000 students on multiple platforms, including Udemy, YouTube, Twitch, and INE.
I am currently OSCP, OSWP, eCPPTX, eWPT, CEH, Pentest+, CCNA, Linux+, Security+, Network+, and A+ certified.
I'm also a husband, animal dad, tinkerer, and military veteran. I hope you enjoy my courses.
Follow Heath on Social Media:
LinkedIn - https://linkedin.com/in/heathadams
Twitter - https://twitter.com/thecybermentor
YouTube - https://youtube.com/c/thecybermentor
Twitch - https://twitch.tv/thecybermentor
Practical Ethical Hacking - The Complete Course
Learn how to hack like a pro by a pro. 25 hours of up to date practical hacking techniques with absolutely no filler.
Windows Privilege Escalation for Beginners
Learn how to escalate privileges on Windows machines with absolutely no filler.
Open-Source Intelligence (OSINT) Fundamentals
Learn the ins and outs of Open Source Intelligence and step up your investigative game.
External Pentest Playbook
Learn to conduct an external network penetration test from start to finish
Practical Malware Analysis & Triage
Arm yourself with knowledge and bring the fight to the bad guys. Learn the state of the art of malware analysis and reverse engineering.
Python 201 For Hackers
Move beyond the basics and learn how to actively use Python as a Windows hacking tool
Practical Web Application Security and Testing
An entry-level course on web application technologies, security considerations for web application development, and the web application penetration testing process.
Practical Windows Forensics
Learn how to conduct a digital forensic investigation on a Windows system from start to finish
The Definitive GRC Analyst Master Class
Everything you need to know to dive into the cybersecurity GRC pool
Frequently Asked Questions
Can I get a refund if I'm unhappy with my purchase?
Yes. All courses come with a 3-day money-back guarantee.
Will I receive a certificate of completion when I finish a course?
Yes. All courses come with a certificate of completion.
Do the courses count as Continuing Education Units (CEUs)?
Yes. Every certificate of completion comes with the total CEUs earned listed on the certificate.
Do course purchases come with lifetime access?
Yes. You only pay once for our courses!
Can I migrate Udemy courses?
Unfortunately, we cannot migrate users from Udemy to the Academy. Udemy does not provide us with student enrollment information. The Udemy courses do receive quality of life updates and are still supported by our team. We apologize for any inconvenience.
What's the difference between purchasing a course and the All-Access Pass?
When a student purchases a course, either individually or with a bundle, they receive lifetime access to the course and its materials. When a student purchases the All-Access pass subscription, they receive access to all of our courses and content, but the access is removed once the monthly subscription ends.