From the course: CompTIA PenTest (PT0-002) Cert Prep
Unlock this course with a free trial
Join today to access over 23,200 courses taught by industry experts.
Privilege escalation: Linux
From the course: CompTIA PenTest (PT0-002) Cert Prep
Privilege escalation: Linux
- We just saw the list of vulnerabilities by operating system. When you work with one operating system, you have a certain set of vulnerabilities. When you switch to another operating system, you get a different set of vulnerabilities. So operating systems really do matter. In fact, that's why we go through the step of OS fingerprinting. So I can know whether I'm working with a Windows machine or iOS mobile device, or Linux or whatever it may be. But once you know the operating system, you actually know more information about not only vulnerabilities, but also how that operating system kind of operates and how I can use that knowledge to escalate my privilege. Privilege escalation is all about the ability to do more than you're supposed to be able to do. By default, if you have a secure system, an unauthorized user should not even be able to log in. But if you can log in, you're probably going to have anonymous type of permissions or maybe very limited permissions. And as you become a…
Contents
-
-
-
-
-
-
-
OWASP Top 108m 40s
-
(Locked)
Application exploits, part 15m 34s
-
(Locked)
SQL injection demo8m 41s
-
(Locked)
Labtainers lab: SQL injection2m 38s
-
(Locked)
Application exploits, part 28m 2s
-
(Locked)
Application exploits, part 39m 11s
-
(Locked)
Cross-site scripting demo7m
-
(Locked)
Labtainers lab: Cross-site scripting1m 36s
-
(Locked)
Labtainers lab: Cross-site request forgery1m 14s
-
(Locked)
Code vulnerabilities16m 36s
-
(Locked)
API attacks and attack resources6m 28s
-
(Locked)
Privilege escalation: Linux9m 37s
-
(Locked)
Privilege escalation: Windows6m 9s
-
(Locked)
Miscellaneous privilege escalation7m 54s
-
(Locked)
Miscellaneous local host vulnerabilities8m 5s
-
-
-
-
-
-
-
-