0:00 - Overview
1:46 - Course Introduction
9:54 - Course Tips & Resources
15:50 - Gaining a Foothold: Intro and Shell Access
23:13 - System Enumeration
29:28 - User Enumeration
34:27 - Network Enumeration
38:43 - Password Enumeration
44:41 - Automated Tools Intro
49:28 - Exploring Automated Tools
1:01:16 - Kernel Exploits Overview
1:04:45 - Escalation via Kernel Exploits
1:10:55 - Passwords and File Permissions Overview
1:11:37 - Escalation via Stored Passwords
1:20:14 - Escalation via Weak File Permissions
1:30:58 - Escalation via SSH Keys
1:36:45 - Sudo Overview
1:38:07 - Escalation via Sudo Shell Escaping
1:44:54 - Escalation via Intended Functionality
1:49:41 - Escalation via LD_PRELOAD
1:56:50 - Challenge Overview
1:58:16 - Challenge Walkthrough
2:11:07 - CVE-2019-14287 Overview
2:14:30 - Escalation via CVE-2019-14287
2:17:12 - Overview and Escalation via CVE-2019-18634
2:24:02 - SUID Overview
2:32:31 - Gaining a Foothold
2:45:41 - Escalation via SUID
2:52:23 - Conclusion
Full course:
Pentests & Security Consulting:
Get Trained:
Get Certified:
Merch:
Sponsorship Inquiries: info@
📱Social Media📱
___________________________________________
Twitter:
Twitch:
Instagram:
LinkedIn:
TikTok: @thecybermentor
Discord:
💸Donate💸
___________________________________________
Like the channel? Please consider supporting me on Patreon:
Support the stream (one-time):
Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking:
The Hacker Playbook 3:
Hacking: The Art of Exploitation:
The Web Application Hacker’s Handbook:
Real-World Bug Hunting: A Field Guide to Web Hacking:
Social Engineering: The Science of Human Hacking:
Linux Basics for Hackers:
Python Crash Course, 2nd Edition:
Violent Python:
Black Hat Python:
My Build:
lg 32gk850g-b 32“ Gaming Monitor:
darkFlash Phantom Black ATX Mid-Tower Case:
EVGA 2080TI:
MSI Z390 MotherBoard:
Intel 9700K:
32GB DDR4 RAM:
Razer Nommo Chroma Speakers:
Razer BlackWidow Chroma Keyboard:
CORSAIR Pro RBG Gaming Mouse:
Sennheiser RS 175 RF Wireless Headphones:
My Recording Equipment:
Panasonic G85 4K Camera:
Logitech C922x Pro Webcam:
Aston Origin Microphone:
Rode VideoMicro:
Mackie PROFX8V2 Mixer:
Elgato Cam Link 4K:
Elgate Stream Deck:
*We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to and affiliated sites.
2 views
4377
1527
8 months ago 00:21:28 1
Тимспик 2020: правильная настройка сервера, группы, права и привилегии
9 months ago 00:17:01 1
Linux gaming isn’t looking too good, but there’s still hope!
10 months ago 00:51:48 133
How OpenBSD’s malloc helps the developer - Otto Moerbeek - EuroBSDcon 2023
1 year ago 00:17:41 1
Как установить LAMP веб сервер на Ubuntu
1 year ago 01:23:55 1
KICA - Live @ Dubai, Exotika, SLS Privilege (Live Set - Tech House) 4K
1 year ago 00:17:21 1
Predator OS for Penetration Testing, Ethical Hacking, Privacy, Hardening, & Secure, Anonymized Linux
1 year ago 00:23:05 4
Accessible Coconut features could make the distro stand out from the crowd
1 year ago 01:14:00 1
@leonicadj - Privilege Elevated: Melodic House/Progressive set from Dubai Rooftop at SLS hotel
1 year ago 00:34:03 1
Linux for Hackers: LINUX commands you need to know (with OTW) // Ep 6
1 year ago 00:45:34 1
Kernel Recipes 2022 - Linux on RISC-V
2 years ago 00:51:31 4
Michael Kerrisk :: Understanding Linux user namespaces
2 years ago 13:01:17 2
Ethical Hacking Full Course with Real Practicals [13 Hours] 🔥 - 2023 Edition
2 years ago 03:11:45 1
Windows Privilege Escalation for Beginners
2 years ago 00:11:31 3
A First Look At ArchEX Linux
2 years ago 02:53:12 19
Linux Privilege Escalation for Beginners
2 years ago 02:00:06 38
Linux for Ethical Hackers (2022 - Full Kali Linux Course)
2 years ago 00:11:17 3
A First Look At Feren OS Alpha 2
2 years ago 12:16:54 1
Ethical Hacking in 12 Hours - Full Course - Learn to Hack!
2 years ago 00:25:37 2
Enumeration(manual) || Linux Privilege Escalation || Episode #1
2 years ago 05:07:39 10
Beginner Web Application Hacking (Full Course)
2 years ago 00:06:34 1
Linux Privilege Escalation - SUID Binary - /bin/cp
2 years ago 00:12:11 2
Tails With Tor Browser Has Been Updated To Version
2 years ago 00:19:49 1
Linux Red Team Defense Evasion Techniques - Hiding Linux Processes
3 years ago 00:38:28 1
Trace Me if You Can: Bypassing Linux Syscall Tracing