Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Hacking Linux
0.0 Introduction
0.1 Welcome to the Course! (An Overview)
0.2 Meet your instructor, Ryan (1:07)
0.3 Pre-requisites and Course Resources (0:49)
1.0 Building Ubuntu VM
1.1 Ubuntu Introduction (0:31)
1.2 Installing Ubuntu on VMWare (optional) (5:17)
1.3 Installing Ubuntu on VirtualBox (optional) (3:56)
1.4 But... Linux is Secure... (4:53)
1.5 Building Ubuntu VM Recap (0:50)
2.0 Building Kali Machine
2.1 Kali Install Introduction (0:59)
2.2 Downloading Kali Linux on VMWare (optional) (1:40)
2.3 Downloading Kali Linux on VirtualBox (optional) (1:31)
2.4 Installing Scripts and Tools (4:23)
2.5 Building Kali Recap (0:52)
3.0 Linux Enumeration
3.1 Enumeration Introduction (1:27)
3.2 NMAP (6:02)
3.3 Network services and ports (4:26)
3.4 NC Enumeration (2:12)
3.5 Enumeration Quiz
3.6 Enumeration Recap (0:37)
4.0 Network Testing
4.1 Network Testing Introduction (0:26)
4.2 FTP Exploitation (10:12)
4.3 SMB / Samba (7:40)
4.4 NFS Misconfigurations (1:43)
4.5 Brute Force with Custom Wordlist (3:26)
4.6 Network Testing Quiz
4.7 Network Testing Recap (0:07)
5.0 Privilege Escalation
5.1 Privilege Escalation Introduction (1:36)
5.2 SNAPSHOT (1:03)
5.3 Transferring Files (6:23)
5.4 Identifying Potential Privilege Escalation Vulnerabilities (1:47)
5.5 Exploiting Sudo Misconfigurations (6:33)
5.6 Capabilities misuse (2:39)
5.7 Exploiting SUID Binaries (6:15)
5.8 Cron Jobs Exploitation (5:12)
5.9 PATH hijacking (8:06)
5.10 Writable files (4:01)
5.11 NFS root squash misconfig (5:28)
5.12 Linpeas (6:56)
5.13 Privilege Escalation Quiz
5.14 Privilege Escalation Recap (0:45)
6.0 Tunneling
6.1 Port Forward Introduction (1:08)
6.2 SSH Remote Port Forward (2:51)
6.3 SSH Local Port Forward (3:08)
6.4 SSH Remote and Local Port Forwarding to Another Port (3:12)
6.5 SSH Dynamic Port Forward (3:07)
6.6 Proxychains with Metasploit (10:51)
6.7 SSH Local and Remote Port Forward to a Different Internal Network (4:33)
6.8 SSH Dynamic Port Forward to a Different Internal Network (0:53)
6.9 Tunneling through Ligolo (9:17)
6.10 Port Foward Quiz
6.11 Port Foward Recap (0:54)
7.0 Persistence
7.1 Persistence Introduction (0:51)
7.2 Planting SSH keys (4:03)
7.3 Abusing PAM modules (2:48)
7.4 Persistence Quiz
7.5 Persistence Recap (0:34)
8.0 Capstone
8.1 Capstone Introduction (0:56)
8.4 Capstone Recap (0:42)
9.0 Conclusion
9.1 Recap and Summary
9.2 Next Steps in Advancing Your Linux Security Skills
9.3 Additional Resources and References
9.4 Let Us Know What You Think💙
6.11 Port Foward Recap
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock