4️⃣4 - Linux Exploitation
Topics
Linux Vulnerabilities
Linux Exploitation
Linux Post-Exploitation
Linux Privilege Escalation
❗ Disclaimer
Never use tools and techniques on real IP addresses, hosts or networks without proper authorization!
One must be comfortable with using the terminal to do basic things such as:
move between directories (cd)
list files (ls)
manage permissions (chmod, chown, chgrp)
find files (find)
understand enviroment variables
understand the role of PATH
understand how to work with privileges (sudo)
understand SUID/GUID binaries
understand how passwords are stored in linux (passwd and shadow files)
understand cronjobs
understand how to use use basic tools (ssh, ftp, curl, nc, python, gcc)
understand how to view processes and open ports (ps, netstat)
Last updated