Hacking Linux // Linux Privilege escalation // Featuring HackerSploit

Hacking Linux // Linux Privilege escalation // Featuring HackerSploit

So you think Linux is secure? In this video we’ll escalate our privileges on Linux to become root.

// MENU //
0:00:00 ▶️ Introduction
0:01:15 ▶️ Jump to the demo
0:01:38 ▶️ About Alexis, background and experience
0:07:38 ▶️ Starting HackerSploit
0:08:47 ▶️ Alexis and Linux
0:11:03 ▶️ Which is the preferred Linux distribution?
0:12:01 ▶️ Recommended Linux distribution for beginners
0:12:33 ▶️ LinuxJourney.com
0:12:01 ▶️ Favourite hacking distribution
0:13:51 ▶️ The PenTester Framework
0:15:21 ▶️ Best method to install a distribution
0:16:46 ▶️ Recommendations
0:18:29 ▶️ Recommended distribution for real-world pentesting
0:21:44 ▶️ Starting YouTube channel
0:22:18 ▶️ Windows vs MacOS vs Linux
0:23:30 ▶️ Recommended laptop
0:27:16 ▶️ Other advice
0:28:38 ▶️ Recommended certifications
0:30:46 ▶️ Recommended pre-requisite skills
0:33:13 ▶️ HackerSploit Linux Essential for Hackers
0:34:01 ▶️ HackerSploit Windows
0:34:26 ▶️ HackerSploit Networking Fundamentals
0:35:11 ▶️ Get your fundamentals right
0:35:29 ▶️ Dirty Pipe exploit presentation
0:43:52 ▶️ Dirty Pipe exploit demo
0:55:14 ▶️ Exploit 1
0:57:03 ▶️ Exploit 2
1:00:23 ▶️ Learning how to change scripts
1:02:14 ▶️ Recommended script language
1:04:00 ▶️ Thoughts on Golang
1:04:44 ▶️ Recommendations for learning languages
1:05:41 ▶️ Closing thoughts

// HackerSploit Linux exploit scripts //
Dirty Pipe Github page: https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits
Dirty Pipe Blog: https://dirtypipe.cm4all.com/
CVE details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847

// Hackersploit Videos //
Pentesters Framework: https://www.youtube.com/watch?v=Bx3RLLD4NO0&t=0s
Linux for hackers: https://www.youtube.com/watch?v=T0Db6dVYyoA&list=PLBf0hzazHTGMh2fe2MFf3lCgk0rKmS2by&t=0s
Windows for hackers:
Nmap series: https://www.youtube.com/watch?v=5MTZdN9TEO4&list=PLBf0hzazHTGM8V_3OEKhvCM9Xah3qDdIx&t=0s
Linux exploitation: https://www.youtube.com/watch?v=i-dQwejj518&list=PLBf0hzazHTGO6Alxf5oduMaUG4W7hbI9a&t=0s
Windows exploitation: https://www.youtube.com/watch?v=BzmljZkgeSs&list=PLBf0hzazHTGMT1CxfH1mdaB3kv9EqiVFq

// Books //
Privilege Escalation Techniques: https://amzn.to/3xcPHjf
Automate the boring the stuff with Python: https://amzn.to/3LQA5Gl

// MY STUFF //
https://www.amazon.com/shop/davidbombal

// SOCIAL //
Discord: https://discord.com/invite/usKSyzb

================
Connect with me:
================
Discord: http://discord.davidbombal.com
​ Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal

================
Support me:
================
Join thisisIT: https://bit.ly/thisisitccna
​ Or, buy my CCNA course and support me:
DavidBombal.com: CCNA ($10): http://bit.ly/yt999ccna
​ Udemy CCNA Course: https://bit.ly/ccnafor10dollars
GNS3 CCNA Course: CCNA ($10): https://bit.ly/gns3ccna10

// HackerSploit //
LinkedIn: https://www.linkedin.com/in/alexisahmed/
YouTube: https://www.youtube.com/c/HackerSploit
Twitter: https://twitter.com/HackerSploit
Academy: https://hackersploit.academy/

// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com

linux
kali linux
kali linux hack
linux hacking
hacker
linux exploit
linux privilege escalation
linux hack
linux dirty pipe
linux dirty pipe explained
linux dirty pipe cve
linux dirty pipe exploit
linux privilege escalation
ethical hacking
linux priv esc
priv escalation linux
hackersploit
hacking
linux exploit
linux dirty pipe
dirty pipe linux
dirty pipe cve
linux vulnerability
linux security
linux exploits
linux kernel
linux kernel vulnerablity
dirty pipe vulnerability

#linux #linuxhack #hacking

subscribe