How To Pass OSCP Series: Linux Privilege Escalation Step-by-Step Guide - Softcover

Buch 2 von 3: How To Pass OSCP Series

Wang, Alan

 
9798586245441: How To Pass OSCP Series: Linux Privilege Escalation Step-by-Step Guide

Inhaltsangabe

Overview

This book is the second of a series of How To Pass OSCP books and focus on techniques used in Linux Privilege Escalation.

This book will walk you through the whole process of how to escalate privilege in a Linux environment using many common techniques. We start by gathering as much information about the target as possible either manually or using automated scripts. Next, we search for misconfigured Cron jobs, suid misconfiguration, bad path configuration, vulnerable kernel, vulnerable software running with high privileges, writable scripts invoked by root, sensitive information stored on local files, credentials saved in the memory, hard-coded credential contained in the application configuration files, and many more.

Who this book is for?

If you are a cybersecurity professional who wants to be certified as an Offensive Security Certified Professional (OSCP), then this book is for you. It is also for those who want to learn about offensive security, Linux security and configuration, and penetration testing.

Since everyone's background and experience are different, the author wrote this book in the way that you can pick any chapter that sounds interesting to you and flip to it, rather than starting at the very beginning.

Table of Contents

  • Introduction
  • Section One: Sudo Rights
    • Chapter 1:Sudo Rights
    • Chapter 2:Sudo LD_Preload
  • Section Two: Linux Kernel
    • Chapter 3:Kernel – Dirty Cow
  • Section Three: Network File System
    • Chapter 4: Network File System (NFS)
  • Section Four: SUID Binary
    • Chapter 5:SUID Binaries - Shared Library
    • Chapter 6:SUID Binaries – Symbolic Link
    • Chapter 7:SUID Binaries – Path Variable
  • Section Five: Cron Jobs
    • Chapter 8:Cron Jobs – File Permission
    • Chapter 9:Cron Jobs – Path Variable
    • Chapter 10:Cron Jobs – Wildcards
  • Section Six: Passwd File
    • Chapter 11:Edit Passwd File
  • Section Seven: Capabilities
    • Chapter 12:Capabilities
  • Section Eight: Process
    • Chapter 13:Process Exim4
  • Section Nine: Password Mining
    • Chapter 14:Password Mining – Memory
    • Chapter 15:Password Mining – MemCached
    • Chapter 16:Password Mining – SSH Key
    • Chapter 17:Password Mining – Config File
  • Section Ten: Database
    • Chapter 18:MySql UDF
  • Section Eleven: Container
    • Chapter 19:Docker Container
    • Chapter 20:LXD Container


About the author

Alan Wang has over 20 years of experience in IT security and developing standardized methodologies for the enterprise to drive business enabling cybersecurity programs and promote industry standards and risk-based investments to maximize business opportunity and minimize risk. He created a Digital Risk platform that enables enterprises across industries to manage business and cyber risks based on a foundation of good governance as well as risk optimization. Throughout his career, he also conducts and directs information security risk assessment efforts as well as provides risk assessment expertise on complex systems, and helps organizations to adopt a focused and business-driven approach when managing and mitigating cyber risks and threats.

For more information, please visit www.howtopassoscp.com.

Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.