Linux Red Team Privilege Escalation Techniques - Kernel Exploits & SUDO Permissions

Поділитися
Вставка
  • Опубліковано 25 лис 2024

КОМЕНТАРІ • 28

  • @passaronegro349
    @passaronegro349 Рік тому +2

    here in Brazil we thank you for your dedication and excellent channel 🇧🇷🇧🇷✨

  • @korovamilkplus
    @korovamilkplus Рік тому +6

    Another great lesson! We'll wait for part 2 with Cron Jobs/Services techniques!
    Thank u Sensei! 🙏

  • @nostalgicnow6001
    @nostalgicnow6001 2 місяці тому +1

    Why is this so hard
    Thanks for helping us understand this more

  • @RX_100.0
    @RX_100.0 Рік тому +3

    We need a pivoting guide sir with and without metasploit
    Lots of love from Indians

  • @omerfarukbilgiseven2787
    @omerfarukbilgiseven2787 Рік тому +4

    Kali machine's theme and terminal is very nice. How can I do like yours

  • @igor4903
    @igor4903 Рік тому

    That's epic! Thanks a lot!

  • @squid13579
    @squid13579 Рік тому

    Long live Hackersploit ! 💪❤️

  • @gw4241
    @gw4241 Рік тому

    you are video is great, i learn many more

  • @moustafakashen3610
    @moustafakashen3610 Рік тому

    Thanks for the video!

  • @nssatomic
    @nssatomic Рік тому

    Where's the documentation for this video?

  • @rafa_br34
    @rafa_br34 2 місяці тому

    17:12 Is there any reason as to why not wget the script directly from github?

    • @SD-Gamer
      @SD-Gamer 28 днів тому +1

      If outsiding isn't available

  • @chesser6425
    @chesser6425 Рік тому

    u the best man thnx

  • @trustedsecurity6039
    @trustedsecurity6039 Рік тому

    Surf on the redteaming wave when this is pentesting stuff :)

  • @orbitxyz7867
    @orbitxyz7867 Рік тому

    Sir why you delete or make private your some videos?

  • @SonuShakyaEC
    @SonuShakyaEC Рік тому

    Amazing

  • @0xNothing
    @0xNothing Рік тому

    Nice

  • @RealCyberCrime
    @RealCyberCrime Рік тому +5

    Windows exploits vs Linux is like recruit difficulty vs veteran

  • @davidyanceyjr
    @davidyanceyjr Рік тому

    always so contrived......I don't know a single experienced linux user you could perform this attack on. No way a regular user gets sudo permissions without password prompt to run Python as root. Just like most of the "hacking" tuts it's contrived bullshit.

  • @0xwxe663
    @0xwxe663 Рік тому

    Linux exploits is way ez then window cause most people who use Linux don’t know how to boost defense on there system while windows you have to ev antivirus and windows defender

    • @painuser100
      @painuser100 Рік тому +2

      that is not entirely true. You could say the same otherwise: people who use Linux are way better informed about Security/Tech than the overall population. Therefore they possibly know where to look out for Security measures. Normal people on Windows only rely on Windows Defender and such, but if the users just set permissions for Fileservers etc. how they want it because they dont know the knowledge behind it makes it much easier for the Hacker to actually break in/doi a priviledge Escalation.

    • @0xwxe663
      @0xwxe663 Рік тому

      @@painuser100 ite so you use Linux right wt distros u use

    • @painuser100
      @painuser100 Рік тому +1

      @@0xwxe663 I mainly work with RHEL and in my freetime I work with Ubuntu, what about you?

  • @websterghoul2022
    @websterghoul2022 Рік тому +1

    grep --color=auto -rnw '/var/ww/html' -ie "PASSWORD" --color=always 2> /dev/null
    From where hackers get this type of command. What do people have to learn to get this type of commands in their head? HOW?

    • @bakeery
      @bakeery Рік тому +1

      it's just a grep command, do 'man grep' to learn more about it