Back to Browse

Privilege Escalation Techniques | 13. Exploiting SUID Binaries

1.6K views
Sep 27, 2021
12:56

Privilege Escalation Techniques is available from: Packt.com: https://bit.ly/3u7eykV Amazon: https://amzn.to/3F14myL This is the “Code in Action” video for chapter 13 of Privilege Escalation Techniques by Alexis Ahmed, published by Packt. It includes the following topics: 00:11 Searching for SUID binaries 06:00 Escalation via shared object injection :Privilege escalation is a crucial step in the exploitation life cycle of a penetration tester. It helps penetration testers to set up persistence and facilitates lateral movement. This book is one-of-a-kind as it covers a range of privilege escalation techniques and tools for both Windows and Linux systems. Connect with Packt: Find us on Facebook: http://www.facebook.com/PacktPub Find us on Twitter: http://www.twitter.com/packtpub Video created by Alexis Ahmed

Download

0 formats

No download links available.

Privilege Escalation Techniques | 13. Exploiting SUID Binaries | NatokHD