Privilege Escalation on Linux Machines - [Security Presentation]

View this thread on: d.buzz | hive.blog | peakd.com | ecency.com
·@cristi·
0.000 HBD
Privilege Escalation on Linux Machines - [Security Presentation]
Jake Williams of Rendition Infosec gave a presentation for some of techniques used to escalate your privileges on a Linux system. 

Who is this relevant for? Well, it is relevant for security researchers and cyber-security professionals. However, bad intentioned parties could also use this for malicious purposes. 

Whenever someone gains access into a system, whether through a running service or through stolen credentials, they usually get in via a low privileged user (sometimes even 'www-data'). From there on, the purpose is gain absolute privileges on the system by owning the root account. This is very often the case. 

And there are so many ways to do that, that's very difficult for system administrators to optimize the server security. In this talk, Jake Williams goes into some of the ways for privilege escalation. It includes:

- local root exploits
- vulnerable services
- misconfigurations
- unpatched applications
- and more.

Some of the ones that appear more dangerous are those where using editors (vi, vim, etc) could simply throw a root shell using built in commands. Anyway, if you're interested in security and you want to learn how to improve the security of your system, this talk is for you. I for one, have saved it and watched it multiple times so far. 

<center>https://www.youtube.com/watch?v=dk2wsyFiosg</center>
___
### <center>To stay in touch with me, follow @cristi</center>   
___
[Cristi Vlad](http://cristivlad.com) Self-Experimenter and Author
👍 , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,