Chapter 2
Post Exploitation
Section 2
Post Exploitation on Linux
After gaining access of a Linux machine, we may not be having the root access still. This will stop us from executing system level commands. The aim of this video is to learn about methods to escalate privilege on a Linux machine. - Exploit and gain access of Linux machine using known vulnerability - Further explore the machine to find misconfigurations - Use the flaws due to misconfigurations, to gain root access