Linux Privilege Escalation - Full Free Course

  Рет қаралды 22,985

hexdump

3 ай бұрын

Upload of the full Linux Exploitation Course.
All the material developed for the course is available in the OSCP repository, link down below.
-------------------------
TIMESTAMP
00:00:00 Linux Privilege Escalation Course
######### 01 Introduction to the Linux Shell
00:05:58 Introduction
00:08:00 CLI vs GUI
00:13:23 Anatomy of a command
00:19:13 Differences between Terminal, TTY and Shell
00:24:23 Basic Commands
00:39:20 Relative and Absolute Paths
00:43:18 File System Commands
00:55:58 Resources Management Commands
01:05:58 Users Management Commands
01:12:43 Packages Management Commands
01:19:46 Conclusion
######### 02 File System Permissions
01:24:04 Introduction
01:25:04 MAN pages
01:30:26 How linux handles file permissions
01:45:34 Pratice on reading permissions
01:51:59 How to set new permissions with chmod
02:03:59 SUID and GUID bits
02:13:19 The sudo subsystem
02:19:39 How to change owner with chown
######### 03 PATH Hijacking
02:22:03 Introduction
02:23:13 What is the PATH?
02:29:33 How is the PATH used?
02:37:03 Example of a vulnerable program
02:44:58 PATH hijacking
02:47:43 Conclusion
######### 04 SUID Exploitation
02:50:21 Introduction
02:51:21 What is SUID?
02:56:11 Security Issues with SUID
02:58:21 Real Effective and Saved User IDs
03:01:01 Example of a SUID binary
03:04:11 GTFObins
03:05:11 SUID Exploitation 1 - wget
03:08:56 SUID Exploitation 2 - hexdump
03:11:16 SUID Exploitation 3 - ssh-keygen
03:15:56 SUID Exploitation 4 - Emacs and Vim
03:17:41 Searching for SUID binaries
######### 05 SUDO Exploitation
03:19:46 Introductionv
03:21:11 Docker Setup
03:24:06 What is SUDO?
03:28:26 Reading output of sudo -l
03:32:20 Reading SUDO configuration file
03:38:16 Update SUDO configuration with visudo
03:39:46 Exploiting SUDO
03:42:47 Example 1 - ALL NOPASSWD
03:45:31 Example 2 - pip install
03:52:46 Example 3 - tar
03:55:46 Example 4 - base64
04:00:06 Conclusion
######### 06 Wildcard Expansion Exploitation
04:01:13 Introduction
04:02:33 Shell wildcards
04:09:43 The danger of wildcards
04:12:03 Scenario 1 - tar
04:18:58 Scenario 2 - find
04:25:25 Scenario 3 - rsync
04:30:05 Conclusion
######### 07 Reverse Shells in Linux
04:31:23 Introduction
04:32:18 Docker Setup
04:34:13 Reverse Shell vs Bind Shell
04:38:23 Reverse Shells are Better
04:42:23 File Transfer Commands
04:50:23 Spawning Reverse Shells
04:51:33 Payload 1 - Bash
04:57:33 Payload 2 - Python
05:01:34 Payload 3 - Perl
05:02:03 Payload 4 - Php
05:02:23 Payload 5 - Ruby
05:03:56 Conclusion
######### 08 Unshadow Attack
05:05:20 Introduction
05:06:35 Docker setup
05:07:50 Shadow and Passwd files
05:15:55 Compute shadow hashes
05:18:40 The role of salt
05:20:45 Wordlists and rockyou.txt
05:22:42 Unshadow attack
05:29:12 Conclusion
######### 09 System Enumeration
05:30:05 Introduction
05:32:10 The value of Enumeration
05:34:50 What to Enumerate
05:48:08 How to Enumerate
06:03:56 Automated Scripts
06:09:05 Conclusion
######### 10 Cronjob Enumeration
06:10:24 Introduction
06:11:39 What is a Cronjob
06:14:19 Cronjob Configuration
06:22:59 Cronjob Enumeration
06:29:49 Cronjob Exploitation
06:35:57 Conclusion
######### 11 Capabilities Enumeration
06:36:23 Introduction
06:37:28 What are capabilities in Linux
06:44:57 How to configure capabilities
06:47:13 How to enumerate capabilities
06:50:28 Powerful capabilities for exploitations
06:53:03 Example cap setuid
06:56:23 Example cap sys ptrace
07:02:13 Conclusion
######### 12 Local Service Exploitation
07:11:54 Local Port Forwarding
07:25:59 Remote Port Forwarding
######### 13 Linux Binary Exploitation
07:30:00 What is a Buffer Overflow
######### 14 Linux Kernel Exploitation
08:11:59 On the danger of Kernel Exploits
-------------------------
REFERENCES
- Material: github.com/LeonardoE95/yt-en/tree/main/src/-
- OSCP repository: github.com/LeonardoE95/OSCP
-------------------------
CONTACTS
- Blog: blog.leonardotamiano.xyz/
- Github: github.com/LeonardoE95?tab=repositories
- Support: www.paypal.com/donate/?hosted_button_id=T49GUPRXALYTQ

Пікірлер: 100
@HeySkidee
@HeySkidee 3 ай бұрын
Bro dropped a movie
@sunn007
@sunn007 3 ай бұрын
Movie ❌ Web Series ✅
@jpkoualaolekague478
@jpkoualaolekague478 2 ай бұрын
I agree that this high level Linux course is free of charge. High quality material. Thank you sir.
@__KiranB
@__KiranB 3 ай бұрын
Can't believe this is free, This is a great video to learn linux.
@nostalgicnow6001
@nostalgicnow6001 10 күн бұрын
thank you for making this im trying to master linux pri esc every video helps
@MustafaGains
@MustafaGains 3 ай бұрын
Pretty clear this man understanding very well how things works and explaining these things in great way.
@hexdump1337
@hexdump1337 2 ай бұрын
I try my best. Thank you for the feedback!
@wooskiwilliams
@wooskiwilliams 3 ай бұрын
love you bro i will watch later came to drop a comment and a like
@2ru2pacFan
@2ru2pacFan 3 ай бұрын
Time to watch it again!
@GurpreetSingh-pl4gv
@GurpreetSingh-pl4gv 3 ай бұрын
Come bro, watch it😅😅
@gokhantekin317
@gokhantekin317 21 күн бұрын
this is so so so learnable lesson. I have tryed to learn privilege escalation twice time bu i couln't.Now it is not that coming scary anymore.so thank you
@hexdump1337
@hexdump1337 21 күн бұрын
That's extremely precious to hear!
@micmaci9343
@micmaci9343 3 ай бұрын
I'm on the begining of the course but I really like whe you sed Do"ll"ar as double ll in single dolar. I keep watching ...
@ashajyothimallya8202
@ashajyothimallya8202 2 ай бұрын
Learning linux. Great explanation. Sharing the video with my friends. Thank you
@hexdump1337
@hexdump1337 2 ай бұрын
Sharing is caring!
@MustafaGains
@MustafaGains 2 ай бұрын
Day 2 watching 1 hour left ❤ you are good Amigo
@threathunter369
@threathunter369 2 ай бұрын
Thank You for all your Video Tutorials, This is very helpful, Keep them Coming, God Speed Man: )
@hexdump1337
@hexdump1337 2 ай бұрын
this is just the start!
@nihal5970
@nihal5970 Ай бұрын
Qualityful lecture. Thanks a lot
@Abdulrehman-pr2sq
@Abdulrehman-pr2sq 2 ай бұрын
Absolute cinema 💥🤯
@aminel2a
@aminel2a 3 ай бұрын
always find ma self watching u dud, keep it up 🐧
@hexdump1337
@hexdump1337 3 ай бұрын
eheh, thanks
@markmeredith836
@markmeredith836 2 ай бұрын
Another quality course
@git-tauseef
@git-tauseef 3 ай бұрын
Love u man ❤❤ pls pls windows privsec in one compiled video pls
@hexdump1337
@hexdump1337 3 ай бұрын
gonna finish the playlist and then do it too 💪🏻
@xis0day844
@xis0day844 2 ай бұрын
Thanks for this video ❤❤❤you are great ❤❤
@aiambainary3234
@aiambainary3234 2 ай бұрын
thank you man, well done, very good job, thanks for sharing.
@chamodmalshan4708
@chamodmalshan4708 3 ай бұрын
Thank you so much. im gonna watch this A - Z
@Sub0x-x40
@Sub0x-x40 3 ай бұрын
this is fccking amazing man
@hexdump1337
@hexdump1337 3 ай бұрын
enjoy it!
@Ternary1982
@Ternary1982 3 ай бұрын
this is a goldmine
@hexdump1337
@hexdump1337 3 ай бұрын
knowledgemine!
@danksama7368
@danksama7368 2 ай бұрын
bro dropped a banger
@DigitalTrendzy2023
@DigitalTrendzy2023 2 ай бұрын
2:10:40 guid bit how many attack's are there . 2:23:34 Important points
@xis0day844
@xis0day844 2 ай бұрын
Thanks brother ❤❤
@nassssssssser1
@nassssssssser1 3 ай бұрын
super.......👍
@hannahprobably5765
@hannahprobably5765 3 ай бұрын
Oo that's big sir! Thanks and waiting for win esc' liked&subbed
@hexdump1337
@hexdump1337 3 ай бұрын
thank uuu
@pajeetsingh
@pajeetsingh 3 ай бұрын
04:19:30 Really didn't understand "rm -f {}" Does rm take -f {}? What does f and {} do and how is it related to find's regex?
@hexdump1337
@hexdump1337 3 ай бұрын
rm takes the -f option, however typically it is useful with something else, like rm -f hello.txt here comes the {} syntax with find. Basically when find finds a match, it will execute the rm -f with the filename as the argument of it. That is, {} will be replaced by the files that were found by find
@croncoder862
@croncoder862 3 ай бұрын
21st century is the best century to be alive, CHANGE MY MIND
@SinergiasHolisticas
@SinergiasHolisticas 3 ай бұрын
Love 🎉❤❤❤
@pajeetsingh
@pajeetsingh 3 ай бұрын
3:3:39 visudo sounds like visual studio. Does MS have 0 day backdoor?
@hexdump1337
@hexdump1337 3 ай бұрын
visudo is a tool for editing the sudo configuration file, which is different than the visual studio text editor
@smaheshg3815
@smaheshg3815 3 ай бұрын
awesome
@evstefan6686
@evstefan6686 Ай бұрын
god bless you
@hexdump1337
@hexdump1337 Ай бұрын
god bless you too for learning!
@LUX-m7r
@LUX-m7r Ай бұрын
The materials for the vedio please , The github shows 404 . can you please provide the notes to the full thing
@hexdump1337
@hexdump1337 Ай бұрын
The correct link is technically this one: github.com/LeonardoE95/yt-en/tree/main/src/2024-09-30-linux-privesc-full However note that it does not contain the whole material for the course. To obtain you, go into the github repository and search for the Linux Privilege Escalation series within the main tables. That will give you the material for the single episodes. I know this is not ideal sorry, when I have more time I will organize it better. here is the main link: github.com/LeonardoE95/yt-en/tree/main
@tanveernowajmajumder920
@tanveernowajmajumder920 3 ай бұрын
Noiceeèeeeeeee❤ Always love a tutorial from you
@dev-null-7w7
@dev-null-7w7 2 ай бұрын
make a video Privilege Escalation full for Windows, thanks to work!
@hexdump1337
@hexdump1337 2 ай бұрын
Working on it!
@divyaveeresha8562
@divyaveeresha8562 5 күн бұрын
Thanks for great course, can you pls share the notes
@hexdump1337
@hexdump1337 5 күн бұрын
You can find everything in the github repository: github.com/LeonardoE95/yt-en
@smaheshg3815
@smaheshg3815 3 ай бұрын
great
@jarekkaminski9690
@jarekkaminski9690 3 ай бұрын
"Windows Privilege Escalation" --version I can't find on your channel 👽
@hexdump1337
@hexdump1337 3 ай бұрын
its not out yet, theres an ongoing playlist
@hexdump1337
@hexdump1337 3 ай бұрын
kzbin.info/aero/PLJnLaWkc9xRh8hmNFWyzWMFgAHo8Lgr93&si=rj2Nc_kBSbP6nolF
@kingmanxx4883
@kingmanxx4883 3 ай бұрын
Thx ❤
@anassbenhalima7004
@anassbenhalima7004 3 ай бұрын
BELLISIMO
@MdSonu-rc7ty
@MdSonu-rc7ty 3 ай бұрын
Now, please make video on windows previlage escalation and Buffer overflow please
@cryophos2044
@cryophos2044 3 ай бұрын
Buffer overflow is outdated and you will not find in modern systems. Modern languages also not let you to do this.
@hexdump1337
@hexdump1337 3 ай бұрын
good point there! If you want to work in the security industry, the web and mobile platforms have much more to offer. However, I consider binary exploitation a very solid training activity. It brings you closer to the machine and the general approach you learn can also be used for more common scenarios
@MdSonu-rc7ty
@MdSonu-rc7ty 3 ай бұрын
Thank you,, But I really want to go with binary exploitation that why I want to learn buffer overflow concepts ,,,, And please continue windows privilege escalation playlist
@adarshbehera2413
@adarshbehera2413 3 ай бұрын
Cool
@SkripdaK
@SkripdaK 2 ай бұрын
Yo can someone index this?? With links?
@aweewa-k1f
@aweewa-k1f 3 ай бұрын
bel video
@reiayanami1441
@reiayanami1441 3 ай бұрын
Hex i was wondering what are your opinion on macos, and do you think is superior to windows?
@hexdump1337
@hexdump1337 3 ай бұрын
Personally, I use linux because of its customization capabilities. In the past I also used windows a lot when I was a gamer. I think macOS is a solid choice for design, graphics, and you can also program ok in it. Windows mostly for games, and linux is the most optimized choice for bringing the workflow to the next level.
@naturessymphony9
@naturessymphony9 2 ай бұрын
please add time stamp in this video
@hexdump1337
@hexdump1337 2 ай бұрын
I did, they are in the description, but youtube fails to render them, not sure why, after the 6 hrs mark it simply doesnt work anymore
@hexdump1337
@hexdump1337 2 ай бұрын
ok, just for you I went back and try to get it working. I removed some timestamps in the later video because I think I have essentially used all capabilities that youtube has to offer. Like, I had too many timestamps. Now it works, and I only cut the specific timestamps for the last two videos, a good tradeoff!
@taimoorejaz6501
@taimoorejaz6501 3 ай бұрын
bro please please please can you make full series for learning RHCSA for free here on youtube, I will pray for you and your family alot, Thanks. Looking forward to hearing from you.
@hexdump1337
@hexdump1337 3 ай бұрын
I will see the content of the cert, you can already find some general linux knowledge in the first two videos of the series. Thank you for the input!
@mr.researcher1525
@mr.researcher1525 3 ай бұрын
Waiting.. for.. privilege exclation, idors, and..pentesting.. infrastructure
@jullien191
@jullien191 3 ай бұрын
Hola, hay por el Android?
@hexdump1337
@hexdump1337 3 ай бұрын
it will come after, but yeah, I will also cover android :D
@shingareom
@shingareom 3 ай бұрын
@tahmeed702
@tahmeed702 2 ай бұрын
What about windows
@hexdump1337
@hexdump1337 2 ай бұрын
working on it!
@AZa4sh1r0
@AZa4sh1r0 3 ай бұрын
Damn Dude wtf hahaha Thanks
@DF-ss5ep
@DF-ss5ep 2 ай бұрын
What do you mean 8 hours??
@hexdump1337
@hexdump1337 2 ай бұрын
480 minutes? 🤣
@pajeetsingh
@pajeetsingh 3 ай бұрын
Video also include Linux basics so maybe change the title?
@hexdump1337
@hexdump1337 3 ай бұрын
The first two videos are meant to introduce linux yeah but only in the context of privilege escalation, there's much more to say in general for Linux, one could make a 8h video only based on the way linux works, so I think the title still makes sense. My idea was to help everyone understand the context, while at the same time knowing that I cannot explain all of linux + privilege escalation in a single series. WIth this, the people who already know the basics can skip directly to the techniques they want to learn, while those who do not have much experience in linux can at least get a bit of context (even tho by itself is clearly not enough)
@gajab4021
@gajab4021 2 ай бұрын
please create on Windows
@hexdump1337
@hexdump1337 2 ай бұрын
working on it!
@AbelMasanja-w5q
@AbelMasanja-w5q 24 күн бұрын
bro is human being
@hexdump1337
@hexdump1337 20 күн бұрын
I’m able to do CAPTHAs, yeah
@AbelMasanja-w5q
@AbelMasanja-w5q 20 күн бұрын
@@hexdump1337exactly bro
@GuruMeditation2099
@GuruMeditation2099 3 ай бұрын
You are priceless
@SkripdaK
@SkripdaK 2 ай бұрын
Windows privesc perfavore!
@Mclovin10080
@Mclovin10080 3 ай бұрын
CREME DE LA CREME
@xis0day844
@xis0day844 2 ай бұрын
Can i get your telegram?
@hexdump1337
@hexdump1337 2 ай бұрын
Hi, feel free to write an email to leo95.yt at gmail dot com
@NnGgnT
@NnGgnT 3 ай бұрын
Ho sentito i primi 20 sec. Sei italiano
@hexdump1337
@hexdump1337 3 ай бұрын
Yes!
@1illuminati-gm1sl
@1illuminati-gm1sl 3 ай бұрын
@ib_concept
@ib_concept 2 ай бұрын
“Don’t stop the chances.”
00:44
ISSEI / いっせい
Рет қаралды 62 МЛН
Мен атып көрмегенмін ! | Qalam | 5 серия
25:41
Арыстанның айқасы, Тәуіржанның шайқасы!
25:51
QosLike / ҚосЛайк / Косылайық
Рет қаралды 700 М.
ТЕЛЕФОН МЕНЯЕТ ЦВЕТ😅 #upx
0:34
RanF
Рет қаралды 639 М.
КАК ЖИВЕТ КВАНТУМ? РУМ ТУР КВАНТУМА!!!
13:51
SH - Anh trai & Em gái || Brother & Sister #shorts
0:58
Su Hao
Рет қаралды 48 МЛН
Лайфхак: Легально делать деньги
0:43