Linux Red Team Privilege Escalation Techniques - Kernel Exploits & SUDO Permissions

Поділитися
Вставка
  • Опубліковано 29 гру 2022
  • In this video, I explore the process of elevating privileges on Linux by leveraging kernel exploits, local accounts, and misconfigured SUDO permissions.
    Privilege Escalation consists of techniques adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with unprivileged access but require elevated permissions to follow through on their objectives. Common approaches are to take advantage of system weaknesses, misconfigurations, and vulnerabilities.
    //PLATFORMS
    BLOG ►► bit.ly/3qjvSjK
    FORUM ►► bit.ly/39r2kcY
    ACADEMY ►► bit.ly/39CuORr
    //SOCIAL NETWORKS
    TWITTER ►► bit.ly/3sNKXfq
    DISCORD ►► bit.ly/3hkIDsK
    INSTAGRAM ►► bit.ly/3sP1Syh
    LINKEDIN ►► bit.ly/360qwlN
    PATREON ►► bit.ly/365iDLK
    MERCHANDISE ►► bit.ly/3c2jDEn
    //BOOKS
    Privilege Escalation Techniques ►► amzn.to/3ylCl33
    Docker Security Essentials (FREE) ►► bit.ly/3pDcFuA
    //SUPPORT THE CHANNEL
    NordVPN Affiliate Link (73% Off) ►► bit.ly/3DEPbu5
    Get $100 In Free Linode Credit ►► bit.ly/39mrvRM
    Get started with Intigriti: go.intigriti.com/hackersploit
    //CYBERTALK PODCAST
    Spotify ►► spoti.fi/3lP65jv
    Apple Podcasts ►► apple.co/3GsIPQo
    //WE VALUE YOUR FEEDBACK
    We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
    //THANK YOU!
    Thanks for watching!
    Благодарю за просмотр!
    Kiitos katsomisesta
    Danke fürs Zuschauen!
    感谢您观看
    Merci d'avoir regardé
    Obrigado por assistir
    دیکھنے کے لیے شکریہ
    देखने के लिए धन्यवाद
    Grazie per la visione
    Gracias por ver
    شكرا للمشاهدة
    -----------------------------------------------------------------------------------
    #redteaming #cybersecurity #pentesting
  • Наука та технологія

КОМЕНТАРІ • 26

  • @tyronemagnus620
    @tyronemagnus620 Рік тому +2

    youre honestly the best, to provide all this information for public availability. not all heroes wear capes.

  • @passaronegro349
    @passaronegro349 Рік тому +1

    here in Brazil we thank you for your dedication and excellent channel 🇧🇷🇧🇷✨

  • @korovamilkplus
    @korovamilkplus Рік тому +5

    Another great lesson! We'll wait for part 2 with Cron Jobs/Services techniques!
    Thank u Sensei! 🙏

  • @igor4903
    @igor4903 Рік тому

    That's epic! Thanks a lot!

  • @moustafakashen3610
    @moustafakashen3610 Рік тому

    Thanks for the video!

  • @gw4241
    @gw4241 Рік тому

    you are video is great, i learn many more

  • @SonuShakyaEC
    @SonuShakyaEC Рік тому

    Amazing

  • @chesser6425
    @chesser6425 Рік тому

    u the best man thnx

  • @RX_100.0
    @RX_100.0 Рік тому +2

    We need a pivoting guide sir with and without metasploit
    Lots of love from Indians

  • @omerfarukbilgiseven2787
    @omerfarukbilgiseven2787 Рік тому +3

    Kali machine's theme and terminal is very nice. How can I do like yours

  • @0xNothing
    @0xNothing Рік тому

    Nice

  • @squid13579
    @squid13579 Рік тому

    Long live Hackersploit ! 💪❤️

  • @trustedsecurity6039
    @trustedsecurity6039 Рік тому

    Surf on the redteaming wave when this is pentesting stuff :)

  • @nssatomic
    @nssatomic Рік тому

    Where's the documentation for this video?

  • @orbitxyz7867
    @orbitxyz7867 Рік тому

    Sir why you delete or make private your some videos?

  • @RealCyberCrime
    @RealCyberCrime Рік тому +5

    Windows exploits vs Linux is like recruit difficulty vs veteran

  • @0xwxe663
    @0xwxe663 Рік тому

    Linux exploits is way ez then window cause most people who use Linux don’t know how to boost defense on there system while windows you have to ev antivirus and windows defender

    • @painuser100
      @painuser100 Рік тому +2

      that is not entirely true. You could say the same otherwise: people who use Linux are way better informed about Security/Tech than the overall population. Therefore they possibly know where to look out for Security measures. Normal people on Windows only rely on Windows Defender and such, but if the users just set permissions for Fileservers etc. how they want it because they dont know the knowledge behind it makes it much easier for the Hacker to actually break in/doi a priviledge Escalation.

    • @0xwxe663
      @0xwxe663 Рік тому

      @@painuser100 ite so you use Linux right wt distros u use

    • @painuser100
      @painuser100 Рік тому +1

      @@0xwxe663 I mainly work with RHEL and in my freetime I work with Ubuntu, what about you?

  • @davidyanceyjr
    @davidyanceyjr 10 місяців тому

    always so contrived......I don't know a single experienced linux user you could perform this attack on. No way a regular user gets sudo permissions without password prompt to run Python as root. Just like most of the "hacking" tuts it's contrived bullshit.

  • @websterghoul2022
    @websterghoul2022 11 місяців тому

    grep --color=auto -rnw '/var/ww/html' -ie "PASSWORD" --color=always 2> /dev/null
    From where hackers get this type of command. What do people have to learn to get this type of commands in their head? HOW?

    • @bakeery
      @bakeery 7 місяців тому +1

      it's just a grep command, do 'man grep' to learn more about it