Тёмный

Linux Red Team Privilege Escalation Techniques - Kernel Exploits & SUDO Permissions 

HackerSploit
Подписаться 941 тыс.
Просмотров 32 тыс.
50% 1

In this video, I explore the process of elevating privileges on Linux by leveraging kernel exploits, local accounts, and misconfigured SUDO permissions.
Privilege Escalation consists of techniques adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with unprivileged access but require elevated permissions to follow through on their objectives. Common approaches are to take advantage of system weaknesses, misconfigurations, and vulnerabilities.
//PLATFORMS
BLOG ►► bit.ly/3qjvSjK
FORUM ►► bit.ly/39r2kcY
ACADEMY ►► bit.ly/39CuORr
//SOCIAL NETWORKS
TWITTER ►► bit.ly/3sNKXfq
DISCORD ►► bit.ly/3hkIDsK
INSTAGRAM ►► bit.ly/3sP1Syh
LINKEDIN ►► bit.ly/360qwlN
PATREON ►► bit.ly/365iDLK
MERCHANDISE ►► bit.ly/3c2jDEn
//BOOKS
Privilege Escalation Techniques ►► amzn.to/3ylCl33
Docker Security Essentials (FREE) ►► bit.ly/3pDcFuA
//SUPPORT THE CHANNEL
NordVPN Affiliate Link (73% Off) ►► bit.ly/3DEPbu5
Get $100 In Free Linode Credit ►► bit.ly/39mrvRM
Get started with Intigriti: go.intigriti.c...
//CYBERTALK PODCAST
Spotify ►► spoti.fi/3lP65jv
Apple Podcasts ►► apple.co/3GsIPQo
//WE VALUE YOUR FEEDBACK
We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
//THANK YOU!
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
-----------------------------------------------------------------------------------
#redteaming #cybersecurity #pentesting

Опубликовано:

 

30 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 27   
@omerfarukbilgiseven2787
@omerfarukbilgiseven2787 Год назад
Kali machine's theme and terminal is very nice. How can I do like yours
@rafa_br34
@rafa_br34 29 дней назад
17:12 Is there any reason as to why not wget the script directly from github?
@nostalgicnow6001
@nostalgicnow6001 24 дня назад
Why is this so hard Thanks for helping us understand this more
@korovamilkplus
@korovamilkplus Год назад
Another great lesson! We'll wait for part 2 with Cron Jobs/Services techniques! Thank u Sensei! 🙏
@davidyanceyjr
@davidyanceyjr Год назад
always so contrived......I don't know a single experienced linux user you could perform this attack on. No way a regular user gets sudo permissions without password prompt to run Python as root. Just like most of the "hacking" tuts it's contrived bullshit.
@RX_100.0
@RX_100.0 Год назад
We need a pivoting guide sir with and without metasploit Lots of love from Indians
@sazidali6857
@sazidali6857 Год назад
In need
@passaronegro349
@passaronegro349 Год назад
here in Brazil we thank you for your dedication and excellent channel 🇧🇷🇧🇷✨
@squid13579
@squid13579 Год назад
Long live Hackersploit ! 💪❤️
@nssatomic
@nssatomic Год назад
Where's the documentation for this video?
@trustedsecurity6039
@trustedsecurity6039 Год назад
Surf on the redteaming wave when this is pentesting stuff :)
@orbitxyz7867
@orbitxyz7867 Год назад
Sir why you delete or make private your some videos?
@RealCyberCrime
@RealCyberCrime Год назад
Windows exploits vs Linux is like recruit difficulty vs veteran
@tonyvelasquez6776
@tonyvelasquez6776 Год назад
Yes, windows sucks
@tonyvelasquez6776
@tonyvelasquez6776 Год назад
@@chineseRATFACE lmao only masochists use centOS 😂😂
@gw4241
@gw4241 Год назад
you are video is great, i learn many more
@moustafakashen3610
@moustafakashen3610 Год назад
Thanks for the video!
@igor4903
@igor4903 Год назад
That's epic! Thanks a lot!
@chesser6425
@chesser6425 Год назад
u the best man thnx
@0xNothing
@0xNothing Год назад
Nice
@SonuShakyaEC
@SonuShakyaEC Год назад
Amazing
@0xwxe663
@0xwxe663 Год назад
Linux exploits is way ez then window cause most people who use Linux don’t know how to boost defense on there system while windows you have to ev antivirus and windows defender
@painuser100
@painuser100 Год назад
that is not entirely true. You could say the same otherwise: people who use Linux are way better informed about Security/Tech than the overall population. Therefore they possibly know where to look out for Security measures. Normal people on Windows only rely on Windows Defender and such, but if the users just set permissions for Fileservers etc. how they want it because they dont know the knowledge behind it makes it much easier for the Hacker to actually break in/doi a priviledge Escalation.
@0xwxe663
@0xwxe663 Год назад
@@painuser100 ite so you use Linux right wt distros u use
@painuser100
@painuser100 Год назад
@@0xwxe663 I mainly work with RHEL and in my freetime I work with Ubuntu, what about you?
@websterghoul2022
@websterghoul2022 Год назад
grep --color=auto -rnw '/var/ww/html' -ie "PASSWORD" --color=always 2> /dev/null From where hackers get this type of command. What do people have to learn to get this type of commands in their head? HOW?
@bakeery
@bakeery 10 месяцев назад
it's just a grep command, do 'man grep' to learn more about it
Далее
#kikakim
00:10
Просмотров 8 млн
How SUDO on Linux was HACKED! // CVE-2021-3156
19:56
Просмотров 201 тыс.
new linux exploit is absolutely insane
8:29
Просмотров 429 тыс.
ShellShock & Kernel Exploits - TryHackMe! 0day
35:10
Просмотров 80 тыс.
Demonstrating the New Linux Exploit (9.9 CVSS)
35:12
Просмотров 10 тыс.
The Tragedy of systemd
47:18
Просмотров 1,1 млн
How the Best Hackers Learn Their Craft
42:46
Просмотров 2,6 млн
#kikakim
00:10
Просмотров 8 млн