Weak File Permissions || Linux Privilege Escalation
Вставка
- Опубліковано 15 лип 2024
- Learn how Weak File Permissions on Linux can be used to perform Privilege Escalation specifically using Passwd, Shadow, and Sudoers files.
🔒 Welcome to The Cyber Expert! 🔒
🌐 Website: thetce.com
❤️ Support the channel by donating at: thetce.com/support
🌟 Join our vibrant community on Discord: / discord
🔔 Join this channel and unlock exclusive perks:
www.youtube.com/@TheCyberExpe...
📺 Visit My Channel For More Exciting Videos:
/ @thecyberexpert
🌎 Where else can you find me? 🌎
🔬 GITHUB: www.github.com/Hellsender01
📷 INSTAGRAM: / harshitjoshi01
🔗 LINKEDIN: / harshitjoshi01
🐦 TWITTER: / thecyberexpert_
📧 EMAIL: hj202001@gmail.com
🙏 Thank you for watching! 🙏
🔥 Stay tuned for the latest updates and intriguing content from The Cyber Expert.
Timestamps:
00:00 - Connecting To Our Lab
01:57 - Intro To Weak File Permissions
04:20 - Shadow File Method 1
06:44 - Shadow File Method 2
12:15 - Passwd File Method 1
18:21 - Passwd File Method 2
20:40 - Passwd File Method 3
22:51 - Sudoers File Method 1
27:50 - Outro
28:03 - Support
🎵 Music in this video: "The Way" by LiQWYD
🎧 Free Download / Stream: bit.ly/3HGU9tD
🎵 Music promoted by Audio Library: • The Way - LiQWYD (No C...
✨ Remember to like, share, and subscribe for more engaging cybersecurity adventures. Stay ahead in the cyber world with The Cyber Expert! ✨
#thecyberexpert
#harshitjoshi
#lpe - Наука та технологія
after years of struggle i got the best teacher on youtube
❤❤❤
Thanks for sharing these amazing tips.
Glad you like them!
Sir... Apke jaisa explanation pure youtube mein nhi hain... Maine bohut sikha apse... Thnk u❤
Glad you think so
bhai video badhiya banai hai tumne thanx for uploading such videos on yt
Glad you likes it
Amazing bro
Thanks 😊
Amazing video sir❤❤❤❤
Thanks a ton 😊
Nice Bhai ❤
Thanks 😊
Amazing 🤩 sir
Thanks
Amazing 👏 best video
Glad you think so 😊
🤩🤩
😊
Nice video love you brother ❤😊
Thanks 😊
Amazing, after completing linux privesc, also make on windows privesc.
Sure thing
Usme support karta hai
Ok 😊
🙏🙏🙏🙏
Hi 👋
❤❤❤❤❤
♥️
❤
♥️
Sir agr humre pass bs right permission hai usse situation me kaise karege/?
Sir malware codeing ke lia konsi language best ha
C is good
Acha sir agar mai /etc/shadow mai zake koi vi user ka password ka hash ka zo type hai o type hi change kardu toh kya hoga ??
There are 6 hash formats that linux identifies, you can use any one of them.
@@TheCyberExpert nahi sir Mai bol Raha hu ap zab koi machine ko hack karne k wad ect/ shadow mai zake root password ka hash change kar raha hai tab zo hash type pahle se hai ohi type ka doosra password k hash Dena padega yea hash type change kar sakte hai ???
@@PALLAB194 yes it works even if change hash type. because of work flow of linux system.
what next video?
Just wait and watch.
which os your using in this video
Mac
Nope Ubuntu
Ubuntu
Bhaiya aapne x wapis se dal diya tha
Ohh, Thanks for letting me know, but I won’t be able to fix it now.
Uploading video
Soon
excellent explanation
Glad you liked it!
Hello Brother 🙋🏻♂️: if you got infected by a Trojan 🐴 then , how would you handle it .😂 Plz let me know, because it'll be " Helpful 🤔" for others too.
Use a good anti virus to scan your system
@@TheCyberExpert I don't think 🤔 any antivirus can remove a Trojan 🐴 from root. What do you think about it & is there any good antivirus for Linux, u know we r the security 😋