Scheduled Releases

Exciting new content is on the horizon. Get ready for fresh challenges, immersive labs, educational chapters, and brain-teasing quizzes.

0 Labs
0 Challenges
7 Chapters
Next Release In
16 hours
Thu, Jan 15 at 00:00
7 Total Points
280 min Est. Time
7 Pro Content
Linux Privilege Escalation: From User Shell to Root Access
New Chapter: SUID/SGID Exploitation

SUID binaries are designed to run with elevated privileges. When misconfigured, they're your ticket to root. 🎯 GTFOBins techniques, custom SUID abuse, and understanding why these binaries are dangerous - from find to vim to custom apps.

Linux Privilege Escalation: From User Shell to Root Access
New Chapter: Sudo & Capabilities Abuse

Sudo gives users controlled root access. But one misconfiguration, one exploitable binary, and you own the system. 🗝️ NOPASSWD entries, env_keep exploits, and Linux capabilities - turning sudo permissions into full root access.

Linux Privilege Escalation: From User Shell to Root Access
New Chapter: Cron Jobs & Scheduled Tasks

Cron jobs run automatically, often as root. If the script is writable, you control what root executes. 🎯 Finding cron jobs, exploiting path issues, wildcard injection - automated tasks become automated privilege escalation.

Linux Privilege Escalation: From User Shell to Root Access
New Chapter: PATH Hijacking & Shared Libraries

When a program calls another without the full path, you can intercept it. When libraries load from writable locations, you inject your code. 💉 PATH manipulation and LD_PRELOAD - making privileged programs run your payloads.

Linux Privilege Escalation: From User Shell to Root Access
New Chapter: Kernel Exploits

The kernel runs everything. A kernel exploit means instant root, bypassing all other controls. ☢️ Dirty COW, Dirty Pipe, and modern kernel vulnerabilities - finding, compiling, and safely executing kernel exploits.

Linux Privilege Escalation: From User Shell to Root Access
New Chapter: Container Escapes

Containers aren't always as isolated as they seem. Mounted sockets, privileged mode, misconfigurations - paths from container to host. 🚀 Docker socket abuse, privileged container escapes, and breaking container boundaries.

Linux Privilege Escalation: From User Shell to Root Access
New Chapter: Defensive Hardening

You know the attacks. Now learn the defenses. 🔒 SELinux, AppArmor, secure configurations, and monitoring - hardening Linux systems against the privilege escalation techniques covered in this course.

Join 5,000+ hackers learning cybersecurity with hands-on labs. Create Account