About this event
How would you become “ROOT” on a Linux machine when you have got a normal user access? This webinar will cover a strategy composed of multiple techniques which can elevate your privileges on Linux systems. Specifically, we will explain and demonstrate the following techniques:
During the webinar, we will practically demonstrate each of those techniques on various vulnerable Capture-the-Flag (CTF) machines. The techniques are useful during your post-exploitation phase that comes after getting a foothold on the system.
Axon Technologies is a cybersecurity services company focused on protecting organizations of various sizes in this digitally connected world. Our mission is to help organizations predict, prevent, detect, respond to, and recover from cyberattacks.
Share this event