Back to Browse

Privilege Escalation Techniques | 10. Linux Kernel Exploits

822 views
Sep 27, 2021
19:05

Privilege Escalation Techniques is available from: Packt.com: https://bit.ly/3u7eykV Amazon: https://amzn.to/3F14myL This is the “Code in Action” video for chapter 10 of Privilege Escalation Techniques by Alexis Ahmed, published by Packt. It includes the following topics: 00:11 Understanding the Linux kernel 03:53 Kernel exploitation with Metasploit 05:32 Manual kernel exploitation :Privilege escalation is a crucial step in the exploitation life cycle of a penetration tester. It helps penetration testers to set up persistence and facilitates lateral movement. This book is one-of-a-kind as it covers a range of privilege escalation techniques and tools for both Windows and Linux systems. Connect with Packt: Find us on Facebook: http://www.facebook.com/PacktPub Find us on Twitter: http://www.twitter.com/packtpub Video created by Alexis Ahmed

Download

0 formats

No download links available.

Privilege Escalation Techniques | 10. Linux Kernel Exploits | NatokHD