#pentesting #ctf #hacking #cybersecurity
00:00 intro
00:42 Privesc technique 1
02:12 Root attack 2
03:57 Attack 3
05:40 Technique 4
08:00 Privilege Escalation attack 5
10:44 Technique 6
12:22 Attack 7
Challenges mentioned in the Video
BilluB0x: • Your OLD Server is HACKED like THIS☝...
BullDog2: • Privilege Escalation Technique You Sh...
Born2Root: • Root with JohnTheRipper Rules Born2...
Born2Rootv2: • PWN a Joomla server Born2rootv2 Ep3
Gallery: • Local privilege escalation and gettin...
BullDog: • Get Root using a Cron job! Bulldog ...
Relativity: • Hijack a relative path and get Root! ...
Gemini v2: • Redis privilege escalation Part 1 G...
In this video, I demonstrate 7 different ways hackers use to achieve privilege escalation and become root on Linux targets. And I also explain how sysadmins and developers can prevent these attacks.
Become a pentester
https://academy.thehackerish.com/p/fr...
Learn the technical skills:
https://thehackerish.com/besthacking...
Become a successful bug bounty hunter: https://thehackerish.com/abugbounty...
Download your FREE Web hacking LAB and starting hacking NOW: https://thehackerish.com/owasptop10...
Read more on the blog: https://thehackerish.com
Discord: / discord
Support this work: https://thehackerish.com/howtosupport
Facebook Page: / thehackerish
Follow us on Twitter: / thehackerish
Listen on Anchor: https://anchor.fm/thehackerish
Listen on Spotify: https://open.spotify.com/show/4Ht8jEb...
Listen on Google Podcasts: https://podcasts.google.com/?feed=aHR...