Back to Browse

Process Hijacking || Linux Privilege Escalation

2.1K views
Feb 25, 2024
5:10

Learn how hijacking a privileged user process can be used to perform Privilege Escalation. πŸ”’ Welcome to The Cyber Expert! πŸ”’ 🌐 Website: https://thetce.com ❀️ Support the channel by donating at: https://thetce.com/support 🌟 Join our vibrant community on Discord: https://discord.gg/VH6twtc9VM πŸ”” Join this channel and unlock exclusive perks: https://www.youtube.com/@TheCyberExpert/join πŸ“Ί Visit My Channel For More Exciting Videos: https://www.youtube.com/@TheCyberExpert 🌎 Where else can you find me? 🌎 πŸ”¬ GITHUB: https://www.github.com/Hellsender01 πŸ“· INSTAGRAM: https://www.instagram.com/harshitjoshi01 πŸ”— LINKEDIN: https://www.linkedin.com/in/harshitjoshi01/ 🐦 TWITTER: https://twitter.com/TheCyberExpert_ πŸ“§ EMAIL: [email protected] πŸ™ Thank you for watching! πŸ™ πŸ”₯ Stay tuned for the latest updates and intriguing content from The Cyber Expert. Timestamps: 00:00 - Connecting To Our Lab 00:53 - Understanding Process Hijacking 01:41 - Finding Running Processes 03:45 - Exploiting Tmux 04:11 - Limitations of Process Hijacking 04:50 - Outro 04:58 - Support 🎡 Music in this video: "The Way" by LiQWYD 🎧 Free Download / Stream: https://bit.ly/3HGU9tD 🎡 Music promoted by Audio Library: https://youtu.be/lUADHP3dmrI ✨ Remember to like, share, and subscribe for more engaging cybersecurity adventures. Stay ahead in the cyber world with The Cyber Expert! ✨ #thecyberexpert #harshitjoshi #lpe

Download

0 formats

No download links available.

Process Hijacking || Linux Privilege Escalation | NatokHD