About this event
How would you become “ROOT” on a Linux machine when you have got a normal user access? This webinar will cover a strategy composed of multiple techniques which can elevate your privileges on Linux systems. Specifically, we will explain and demonstrate the following techniques:
During the webinar, we will practically demonstrate each of those techniques on various vulnerable Capture-the-Flag (CTF) machines. The techniques are useful during your post-exploitation phase that comes after getting a foothold on the system.
Hosted by
Axon is a Cybersecurity services company focused on protecting organizations of various sizes in this digitally connected world.