Section 3: Linux Privilege Escalation
This section will cover the privilege escalation process on Linux. You will be able to elevate your privileges on the target system through the use of multiple privilege escalation attack vectors, tools, and techniques.
The following chapters are included in this section:
- Chapter 10, Linux Kernel Exploits
- Chapter 11, Linux Password Mining
- Chapter 12, Scheduled Tasks
- Chapter 13, Exploiting SUID Binaries