Shells and Privilege Escalation

Once you have initial access on a machine, learn how to escalate your account privileges to root.
Having limited user access on a system won't give you the necessary privileges you need to fully exploit it. Privilege escalation is an essential part of any security engagement. This module will give you the necessary skills to enumerate and identify how a system can be made vulnerable. You'll get hands on by fully exploiting a variety of machines, through various vulnerabilities and misconfigurations; kernel exploits, vulnerable services and permission issues are a few of the techniques you'll use to gain system level access.

0%
What the Shell?
An introduction to sending and receiving (reverse/bind) shells when exploiting target machines.
0%
Common Linux Privesc
A room explaining common Linux privilege escalation
0%
Linux PrivEsc
Practice your Linux Privilege Escalation skills on an intentionally misconfigured Debian VM with multiple ways to get root! SSH is available. Credentials: user:password321
What are modules?
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).
