Process Hijacking || Linux Privilege Escalation

Поділитися
Вставка
  • Опубліковано 15 лип 2024
  • Learn how hijacking a privileged user process can be used to perform Privilege Escalation.
    🔒 Welcome to The Cyber Expert! 🔒
    🌐 Website: thetce.com
    ❤️ Support the channel by donating at: thetce.com/support
    🌟 Join our vibrant community on Discord: / discord
    🔔 Join this channel and unlock exclusive perks:
    www.youtube.com/@TheCyberExpe...
    📺 Visit My Channel For More Exciting Videos:
    / @thecyberexpert
    🌎 Where else can you find me? 🌎
    🔬 GITHUB: www.github.com/Hellsender01
    📷 INSTAGRAM: / harshitjoshi01
    🔗 LINKEDIN: / harshitjoshi01
    🐦 TWITTER: / thecyberexpert_
    📧 EMAIL: hj202001@gmail.com
    🙏 Thank you for watching! 🙏
    🔥 Stay tuned for the latest updates and intriguing content from The Cyber Expert.
    Timestamps:
    00:00 - Connecting To Our Lab
    00:53 - Understanding Process Hijacking
    01:41 - Finding Running Processes
    03:45 - Exploiting Tmux
    04:11 - Limitations of Process Hijacking
    04:50 - Outro
    04:58 - Support
    🎵 Music in this video: "The Way" by LiQWYD
    🎧 Free Download / Stream: bit.ly/3HGU9tD
    🎵 Music promoted by Audio Library: • The Way - LiQWYD (No C...
    ✨ Remember to like, share, and subscribe for more engaging cybersecurity adventures. Stay ahead in the cyber world with The Cyber Expert! ✨
    #thecyberexpert
    #harshitjoshi
    #lpe
  • Наука та технологія

КОМЕНТАРІ • 19

  • @Akshay-te8pm
    @Akshay-te8pm 4 місяці тому +2

    Aisa teacher mile to aur kya chahiye 🥺❤

  • @mezbahul4334
    @mezbahul4334 4 місяці тому +2

    Never studied about this topic.so much useful.waiting for windows privesc series.BTW the last video of this series should be about enumeration

  • @amanpatel3982
    @amanpatel3982 4 місяці тому +1

    windows privilege escalation series plz

  • @avadhutshinde7983
    @avadhutshinde7983 4 місяці тому +1

    After this series plz aslo make video man windows privilege escalation

  • @ExploitHunter
    @ExploitHunter 4 місяці тому +1

    Similar to msf migrate command

  • @kkaran_13
    @kkaran_13 4 місяці тому +2

    Sir i am 3rd year cse student. Can you please help which types of cyber project should i make for placements. Plz make video on it. Please provide some resources for it

  • @Ft.Prince
    @Ft.Prince 4 місяці тому +1

    Can you make a new video for roadmap for ethical hacking & cyber Security 2024

    • @TheCyberExpert
      @TheCyberExpert  4 місяці тому +1

      My roadmap video is still good for 2024

  • @rajankumaryadav8413
    @rajankumaryadav8413 4 місяці тому +1

    bro give me one backdoor to access android phone

    • @TheCyberExpert
      @TheCyberExpert  4 місяці тому

      Watch msfvenom video

    • @rajankumaryadav8413
      @rajankumaryadav8413 3 місяці тому

      bro i need some backdoor once i install this backdoor next time i will be access any time in any where i don't wanna my victim are click when i need the session i need honest answer @@TheCyberExpert

  • @mmashorts8682
    @mmashorts8682 4 місяці тому +1

    Ek baat puchni thi indian hacker itna fhudu q hota he 😂

    • @TheCyberExpert
      @TheCyberExpert  4 місяці тому +1

      Kyuki unko sikhane kae liye apke jasse legend hackers nahi hai