Privilege Escalation Techniques is available from:
Packt.com: https://bit.ly/3u7eykV
Amazon: https://amzn.to/3F14myL
This is the “Code in Action” video for chapter 10 of Privilege Escalation Techniques by Alexis Ahmed, published by Packt. It includes the following topics:
00:11 Understanding the Linux kernel
03:53 Kernel exploitation with Metasploit
05:32 Manual kernel exploitation
:Privilege escalation is a crucial step in the exploitation life cycle of a penetration tester. It helps penetration testers to set up persistence and facilitates lateral movement. This book is one-of-a-kind as it covers a range of privilege escalation techniques and tools for both Windows and Linux systems.
Connect with Packt:
Find us on Facebook: http://www.facebook.com/PacktPub
Find us on Twitter: http://www.twitter.com/packtpub
Video created by Alexis Ahmed
Download
0 formats
No download links available.
Privilege Escalation Techniques | 10. Linux Kernel Exploits | NatokHD