about-me variable
Axon Technologies invites you to their webinar

Privilege Escalation Attacks on Linux Systems

About this webinar

How would you become “ROOT” on a Linux machine when you have got a normal user access? This webinar will cover a strategy composed of multiple techniques which can elevate your privileges on Linux systems. Specifically, we will explain and demonstrate the following techniques:

  1. Locally exploiting kernel vulnerabilities.
  2. Abusing SUDO permissions of attacked users.
  3. Extracting sensitive information from history.
  4. Exploiting SETUID (set user ID) programs.
  5. Exploiting services running as Root.
  6. Exploiting mis-configured Cron jobs.

During the webinar, we will practically demonstrate each of those techniques on various vulnerable Capture-the-Flag (CTF) machines. The techniques are useful during your post-exploitation phase that comes after getting a foothold on the system.

Hosted by

  • Team member
    RA T
    Rayan Armoush

Axon Technologies

Your Cybersecurity Partner

Axon is a Cybersecurity services company focused on protecting organizations of various sizes in this digitally connected world.