Process Hijacking || Linux Privilege Escalation
Learn how hijacking a privileged user process can be used to perform Privilege Escalation. π Welcome to The Cyber Expert! π π Website: https://thetce.com β€οΈ Support the channel by donating at: https://thetce.com/support π Join our vibrant community on Discord: https://discord.gg/VH6twtc9VM π Join this channel and unlock exclusive perks: https://www.youtube.com/@TheCyberExpert/join πΊ Visit My Channel For More Exciting Videos: https://www.youtube.com/@TheCyberExpert π Where else can you find me? π π¬ GITHUB: https://www.github.com/Hellsender01 π· INSTAGRAM: https://www.instagram.com/harshitjoshi01 π LINKEDIN: https://www.linkedin.com/in/harshitjoshi01/ π¦ TWITTER: https://twitter.com/TheCyberExpert_ π§ EMAIL: [email protected] π Thank you for watching! π π₯ Stay tuned for the latest updates and intriguing content from The Cyber Expert. Timestamps: 00:00 - Connecting To Our Lab 00:53 - Understanding Process Hijacking 01:41 - Finding Running Processes 03:45 - Exploiting Tmux 04:11 - Limitations of Process Hijacking 04:50 - Outro 04:58 - Support π΅ Music in this video: "The Way" by LiQWYD π§ Free Download / Stream: https://bit.ly/3HGU9tD π΅ Music promoted by Audio Library: https://youtu.be/lUADHP3dmrI β¨ Remember to like, share, and subscribe for more engaging cybersecurity adventures. Stay ahead in the cyber world with The Cyber Expert! β¨ #thecyberexpert #harshitjoshi #lpe
Download
0 formatsNo download links available.