Linux Privilege Escalation: Zero to Hero for OSCP
Автор: TechBlazes Cyber
Загружено: 2025-11-27
Просмотров: 43
Описание:
🔥 Master Linux Privilege Escalation from Zero to Hero — Essential for OSCP Success!
This video provides a complete, practical introduction to Linux Privilege Escalation, covering more than 30 real-world techniques used in OSCP-style exams and penetration tests. Whether you're preparing for certification or improving your ethical hacking skills, this guide will help you understand how attackers escalate privileges — and how to prevent it.
You’ll learn how to exploit misconfigurations, SUID binaries, crontab tasks, weak file permissions, writable shadow files, sudo misconfigurations, and more. Each technique is demonstrated step by step, making it perfect for beginners and intermediate learners.
This tutorial also shows you how to set up a Linux server in VirtualBox, create users, work with the CLI, and analyze privilege escalation vectors using tools like linPEAS, linsecurity, and Hashcat. 🐧🔐
If you're aiming for the OSCP, CEH, or any penetration testing certification, this is a must-study topic.
⭐ What You’ll Learn
🔍 How Linux privilege escalation works
🛠️ 30+ real examples of privilege escalation techniques
📁 Exploiting weak permissions (passwd, shadow, group, 777 files)
🧱 SUID, sudo misconfigurations, and dangerous binaries
⏱️ Crontab privilege escalation methods
🐍 Using Python, Perl, bash, sed, awk for privesc
📦 Docker privilege escalation basics
🔒 How to prevent privilege escalation in Linux
🐧 How to use linPEAS, lin.security, and Hashcat for analysis
🔗 Suggested Links
⏱ Suggested Timestamps
00:00 What do you need?
03:43 Setting Up Ubuntu Server
10:46 Setting Network and Connecting via SSH
17:07 Setting Up Bad Permissions – passwd
27:35 Exploiting Bad Permission – passwd
34:39 Another Way to Exploit passwd
44:33 How to Stop It?
48:40 Challenge
53:47 Group File Intro
56:25 Exploiting Bad Permission 777 – group
1:02:58 How to Find 777
1:10:08 RWXRWXRWX /etc/shadow
1:22:14 Readable /etc/shadow
🔐 SUID Section
1:35:04 SUID
1:42:51 SUID Example
1:49:29 SUID nano and vim
1:57:42 How to Find SUID
2:02:58 SUID cp command
🧰 SUDO & Command Exploits
2:11:08 SUDO Intro
2:18:03 More
2:24:42 Vim
2:29:38 Less
2:36:24 Find
2:41:25 awk
2:46:25 /bin/bash
2:53:05 Python and Perl
3:01:31 /bin/bash with File – echo
3:10:57 SED
3:16:19 SED SUDO Privilege Escalation
⏰ Crontab, LinPEAS, Hashcat, Lin.Security
3:26:11 Crontab Privilege Escalation 1
3:36:63 Crontab Privilege Escalation 2
3:44:57 LinPEAS
3:58:30 Cracked Password with Hashcat
4:10:61 Lin.Security Intro
4:12:36 Lin.Security – sudo -l
4:25:52 Lin.Security – Hash in /etc/passwd
4:33:11 Lin.Security – SUID and Home
4:37:39 Lin.Security – Root Squashing
4:52:52 Docker Priv Escalation
4:56:46 Lin.Security (Outro)
📄 Bonuses
4:56:46 Linux Privilege Escalation Cheat Sheet
4:56:46 Linux Privilege Escalation Notes
📌 Hashtags
#LinuxPrivilegeEscalation #OSCP #EthicalHacking #CyberSecurity #LinuxSecurity #PenetrationTesting #RedTeam #InfoSec
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: