eLearnSecurity

We Revolutionize The Way the World Gains IT Security Skills

Course logo

Free Demo - Penetration Testing Professional - PTP

In this demo module, you will learn how to perform detailed enumeration, privilege escalation and restricted shell escaping, after you compromise a Linux target.

I agree to receive emails from Caendra Inc.
  • Thoroughly enumerate a Linux target during post-exploitation
  • Identify and leverage configuration files for privilege escalation
  • Identify and leverage SUID binaries or sudo misconfigurations for privilege escalation
  • Learn how to escape restricted shells
  • Learn how to crack the shadow on a Linux target
  • Learn how to obtain credentials from a Linux target's memory