To access material, start machines and answer questions login.
By now, you should have an understanding of basic privilege escalation techniques and how to enumerate and exploit them. This room will take this one step further and expand your arsenal with tools that can automate this process or help you find hidden privilege escalation vectors.

Learning Objectives
- Demonstrate privilege escalation enumeration using automated tools
- Demonstrate privilege escalation techniques using public exploits
- Understand process snooping
Prerequisites
Ready to learn Cyber Security?
The Linux Privilege Escalation: Automation room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
