intermediate30 hours

Linux Privilege Escalation

Learn how to escalate from a low-privileged shell to root access on Linux systems. This path covers both manual enumeration techniques and automated tools, preparing you for CTFs and real-world penetration tests. You'll understand why these vulnerabilities exist and how to identify them quickly during engagements.

19 lessons
6 chapters

Prerequisites

Basic Linux command lineUnderstanding of Linux file permissionsSSH usage

Course Content

Chapter 1

System Enumeration

Gathering information for privilege escalation

3 lessons
Chapter 2

SUID/SGID Exploitation

Exploiting misconfigured SUID and SGID binaries

3 lessons
Chapter 3

Sudo Exploitation

Exploiting sudo misconfigurations

3 lessons
Chapter 4

Scheduled Tasks & Cron

Exploiting cron jobs and scheduled tasks

3 lessons
Chapter 5

Kernel Exploitation

Exploiting kernel vulnerabilities for root

3 lessons
Chapter 6

Miscellaneous Techniques

Other privilege escalation vectors

4 lessons

Ready to start?

Begin your journey with the first lesson. Your progress is saved automatically.

Start Learning