From the course: CompTIA PenTest (PT0-002) Cert Prep

Unlock this course with a free trial

Join today to access over 23,200 courses taught by industry experts.

Privilege escalation: Linux

Privilege escalation: Linux

- We just saw the list of vulnerabilities by operating system. When you work with one operating system, you have a certain set of vulnerabilities. When you switch to another operating system, you get a different set of vulnerabilities. So operating systems really do matter. In fact, that's why we go through the step of OS fingerprinting. So I can know whether I'm working with a Windows machine or iOS mobile device, or Linux or whatever it may be. But once you know the operating system, you actually know more information about not only vulnerabilities, but also how that operating system kind of operates and how I can use that knowledge to escalate my privilege. Privilege escalation is all about the ability to do more than you're supposed to be able to do. By default, if you have a secure system, an unauthorized user should not even be able to log in. But if you can log in, you're probably going to have anonymous type of permissions or maybe very limited permissions. And as you become a…

Contents