Linux Exploitation
Course Description
Linux powers the majority of servers, cloud infrastructure, and IoT devices. This course teaches you to identify and exploit Linux vulnerabilities, from basic privilege escalation to advanced kernel exploits.
Learning Objectives
By the end of this course, you will be able to:
- Enumerate Linux systems for privilege escalation vectors
- Exploit SUID/SGID binaries and capabilities
- Abuse sudo misconfigurations and cron jobs
- Perform kernel exploitation techniques
- Escape Docker and Kubernetes containers
- Maintain persistence on Linux systems
Course Structure
Modules
Module 1: Linux Security Fundamentals (6h)
- Linux file permissions deep dive
- User and group management
- SELinux and AppArmor basics
- Linux security modules
- Audit framework
Module 2: Enumeration Techniques (8h)
- Manual enumeration scripts
- LinPEAS and LinEnum usage
- Network enumeration
- Process and service enumeration
- Cron job discovery
- Installed software analysis
Module 3: SUID/SGID Exploitation (8h)
- Finding SUID binaries
- GTFOBins exploitation
- Custom SUID exploits
- Capabilities abuse
- Library hijacking
Module 4: Sudo Abuse (6h)
- Sudo misconfigurations
- Sudo version exploits
- LD_PRELOAD attacks
- PATH hijacking
- Sudo rules bypass
Module 5: Cron & Scheduled Tasks (6h)
- Cron job enumeration
- Writable script exploitation
- PATH manipulation
- Wildcard injection
- Systemd timer abuse
Module 6: Kernel Exploitation (10h)
- Kernel version identification
- Public exploit adaptation
- Dirty COW and variants
- Dirty Pipe exploitation
- Kernel module attacks
- Return-oriented programming (ROP)
Module 7: Container Escape (8h)
- Docker enumeration
- Privileged container escape
- Docker socket abuse
- Kubernetes escape techniques
- Container breakout methods
- cgroups exploitation
Module 8: Persistence & Post-Exploitation (6h)
- SSH key persistence
- Cron persistence
- Systemd persistence
- Rootkits basics
- Log manipulation
- Anti-forensics on Linux
Tools
| Tool | Purpose |
|---|---|
| LinPEAS | Privilege escalation scanner |
| LinEnum | Enumeration script |
| pspy | Process monitoring |
| GTFOBins | Binary exploitation reference |
| linux-exploit-suggester | Kernel exploit finder |
| Docker | Container testing |
Ethical Use Only
Only exploit systems you own or have explicit authorization to test.
Quick Navigation
📄️ Overview
Master Linux security: kernel exploits, container security, SUID/SGID abuse, and privilege escalation