Linux Red Team Privilege Escalation Techniques - Kernel Exploits & SUDO Permissions
Вставка
- Опубліковано 29 гру 2022
- In this video, I explore the process of elevating privileges on Linux by leveraging kernel exploits, local accounts, and misconfigured SUDO permissions.
Privilege Escalation consists of techniques adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with unprivileged access but require elevated permissions to follow through on their objectives. Common approaches are to take advantage of system weaknesses, misconfigurations, and vulnerabilities.
//PLATFORMS
BLOG ►► bit.ly/3qjvSjK
FORUM ►► bit.ly/39r2kcY
ACADEMY ►► bit.ly/39CuORr
//SOCIAL NETWORKS
TWITTER ►► bit.ly/3sNKXfq
DISCORD ►► bit.ly/3hkIDsK
INSTAGRAM ►► bit.ly/3sP1Syh
LINKEDIN ►► bit.ly/360qwlN
PATREON ►► bit.ly/365iDLK
MERCHANDISE ►► bit.ly/3c2jDEn
//BOOKS
Privilege Escalation Techniques ►► amzn.to/3ylCl33
Docker Security Essentials (FREE) ►► bit.ly/3pDcFuA
//SUPPORT THE CHANNEL
NordVPN Affiliate Link (73% Off) ►► bit.ly/3DEPbu5
Get $100 In Free Linode Credit ►► bit.ly/39mrvRM
Get started with Intigriti: go.intigriti.com/hackersploit
//CYBERTALK PODCAST
Spotify ►► spoti.fi/3lP65jv
Apple Podcasts ►► apple.co/3GsIPQo
//WE VALUE YOUR FEEDBACK
We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
//THANK YOU!
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
-----------------------------------------------------------------------------------
#redteaming #cybersecurity #pentesting - Наука та технологія
youre honestly the best, to provide all this information for public availability. not all heroes wear capes.
here in Brazil we thank you for your dedication and excellent channel 🇧🇷🇧🇷✨
Another great lesson! We'll wait for part 2 with Cron Jobs/Services techniques!
Thank u Sensei! 🙏
That's epic! Thanks a lot!
Thanks for the video!
you are video is great, i learn many more
Amazing
u the best man thnx
We need a pivoting guide sir with and without metasploit
Lots of love from Indians
In need
Kali machine's theme and terminal is very nice. How can I do like yours
Nice
Long live Hackersploit ! 💪❤️
Surf on the redteaming wave when this is pentesting stuff :)
Where's the documentation for this video?
Sir why you delete or make private your some videos?
Windows exploits vs Linux is like recruit difficulty vs veteran
Yes, windows sucks
@@chineseRATFACE lmao only masochists use centOS 😂😂
Linux exploits is way ez then window cause most people who use Linux don’t know how to boost defense on there system while windows you have to ev antivirus and windows defender
that is not entirely true. You could say the same otherwise: people who use Linux are way better informed about Security/Tech than the overall population. Therefore they possibly know where to look out for Security measures. Normal people on Windows only rely on Windows Defender and such, but if the users just set permissions for Fileservers etc. how they want it because they dont know the knowledge behind it makes it much easier for the Hacker to actually break in/doi a priviledge Escalation.
@@painuser100 ite so you use Linux right wt distros u use
@@0xwxe663 I mainly work with RHEL and in my freetime I work with Ubuntu, what about you?
always so contrived......I don't know a single experienced linux user you could perform this attack on. No way a regular user gets sudo permissions without password prompt to run Python as root. Just like most of the "hacking" tuts it's contrived bullshit.
grep --color=auto -rnw '/var/ww/html' -ie "PASSWORD" --color=always 2> /dev/null
From where hackers get this type of command. What do people have to learn to get this type of commands in their head? HOW?
it's just a grep command, do 'man grep' to learn more about it