Pick Up How To Pass OSCP Series: Linux Privilege Escalation Step-by-Step Guide Created By Alan Wang Provided As Digital
the author has an understanding of the subject material, unfortunately the book itself is incredibly lacking, Whole sections are copy/pasted ad nauseum and needlessly repeated with every example, This combined with excessively large font, overused white space, and Well written book, Personally think this is better than any official material that is provided, This book was a very enjoyable read and I would highly recommend it, It is written in a very clear and concise manner and has excellent background information for each section, While it provides a step by step guide for privilege escalation, it also takes the I bought both Windows and Linux of this series and really enjoyed the step by step approach along with screenshots.
The author did a good job explaining how to identify, develop and exploit the vulnerabilities to escalate privilege, Each step with the screenshot makes it This book is poorly written, poor quality print binding, and far overpriced for the content all of which is openly available online.
The physical size of the book is huge, and the print is huge not bad for my tired old eyes, too bad it doesn't any content worth This book is the second of a series of How To Pass OSCP books and focus on techniques used in Linux Privilege Escalation.
This book will walk you through the whole process of how to escalate privilege in a Linux environment using many common techniques, We start by gathering as much information about the target as possible either manually or using automated scripts,
Next, we search for misconfigured Cron jobs, suid misconfiguration, bad path configuration, vulnerable kernel, vulnerable software running with high privileges, writable scripts invoked by root, sensitive information stored on local files, credentials saved in the memory, hard coded credential contained in the application configuration files, and many.
Table of Contents Introduction Section One: Sudo Rights Chapter:Sudo Rights Chapter:Sudo LDPreload Section Two: Linux Kernel Chapter:Kernel Dirty Cow Section Three: Network File System Chapter: Network File System NFS Section Four: SUID Binary Chapter:SUID Binaries Shared Library Chapter:SUID Binaries Symbolic Link Chapter:SUID Binaries Path Variable Section Five: Cron Jobs Chapter:Cron Jobs File Permission Chapter:Cron Jobs Path Variable Chapter:Cron Jobs Wildcards Section Six: Passwd File Chapter:Edit Passwd File Section Seven: Capabilities Chapter:Capabilities Section Eight: Process Chapter:Process EximSection Nine: Password Mining Chapter:Password Mining Memory Chapter:Password Mining MemCached Chapter:Password Mining SSH Key Chapter:Password Mining Config File Section Ten: Database Chapter:MySql UDF Section Eleven: Container Chapter:Docker Container Chapter:LXD Container For information, please visit.