Learn Windows and Linux Privilege Escalation Attacks

Master privilege escalation attacks on both Windows and Linux through real-world penetration testing scenarios. Learn to identify and exploit common misconfigurations and system vulnerabilities for privilege elevation to root or system administrators access during ethical hacks.

4.8
β˜…β˜…β˜…β˜…β˜…
(50)
1,000 Students
12 Hours
Stage 5 - Advanced

Last update: Jan 2021

Audio Language: English

Subtitles/Captions: Yes

Caption Language: English

Focus: Ethical Hacking Courses, Penetration Testing Training Courses

Type of Training: Online, self-paced

Learn Windows and Linux Privilege Escalation Attacks

What You’ll Learn

This privilege escalation attacks course will teach you:

  • CTF Machine Walkthroughs: Solve vulnerable machines and get hands-on experience in vertical privilege escalation and horizontal privilege escalation.
  • OSCP Exam Preparation: Build the hands-on skills needed to pass exams like OffSec Certified Professional (OSCP).
  • Post-Exploitation Insights: Gain deep control over compromised systems and pivot to other targets.
  • Exploitation Tools: Use Metasploit, reverse shells, and Python payloads to escalate access.
  • Linux Privilege Escalation: Techniques for exploiting SUID binaries, cron jobs, kernel exploits, incorrect security settings, and path misconfigurations to become a privileged user.
  • Windows Privilege Escalation: Practical skills in privilege elevation, including token manipulation, exploit suggesters, and β€œPotato” attacks.
  • Enumeration Tactics: Discover methods to extract valuable information about user permissions, services, and configuration flaws.

Included in the Windows and Linux Privilege Escalation Attacks Course

12 Hours of On-Demand Video

Certificate of Completion

2 Articles

Access on Mobile

Suitable for the Following Careers

Penetration Tester

Ethical Hacker

Red Team Operator

OSCP Candidate

Course Content

Training Overview

icon-yt Description of Training Preview
icon-yt Video Overview Preview

1. Introduction

icon-yt 1. Introduction Preview
icon-yt 2. Course Manual Preview

2. Bandit

icon-yt 3. Bandit Intro Preview
icon-yt 4. Bandit File Find Cat Preview
icon-yt 5. Bandit Strings Grep Preview
icon-yt 6. Bandit Base64 Preview
icon-yt 7. Bandit Gzip Bzip Tar Preview
icon-yt 8. Bandit Nmap Preview
icon-yt 9. Bandit Diff Ssh Preview
icon-yt 10. Bandit Suid Preview
icon-yt 11. Bandit Cron Preview
icon-yt 12. Bandit Cron Advanced Preview
icon-yt 13. Bandit NCat Python Preview
icon-yt 14. Bandit Vim More Preview
icon-yt 15. Bandit Git Preview
icon-yt 16. Bandit Shell Preview

3. Wakanda

4. Mr. Robot

5. Fristi Leaks

6. Linux Privilege Escalation

7. Windows Privilege Escalation

8. Arctic

9. Closing

OPEN FULL CURRICULUM

Requirements

Intermediate cybersecurity knowledge

Basic understanding of Python scripting

Experience using Kali Linux or similar tools

Optional: Hack The Box account for some Windows labs

Prior completion of beginner-level ethical hacking courses recommended

Description of the Privilege Escalation Attacks Course

This course dives deep into one of the most crucial stages in ethical hackingβ€”privilege escalation. You'll start by working through vulnerable Linux machines, learning how an attacker gains access, and then mastering attacks that exploit misconfigured SUID files, vulnerable cron jobs, and weak kernel permissions. Then, you'll switch gears to tackle real-world Windows escalation challenges using tools and techniques favored by professionals and exam proctors alike to become system administrators.

You'll work through hands-on scenarios, including brute-force attacks, Sudo misconfigurations, shadow file cracking, Metasploit modules, and advanced techniques like token impersonation and Potato-style attacks. Whether you’re preparing for the OSCP or conducting real pentests, this course helps you move from initial access to full system compromise as a privileged user.

  • Walk through CTF machines with privilege escalation challenges
  • Practice with Metasploit, custom exploits, and manual techniques to compromise user accounts
  • Exploit Linux escalation vectors, including PATH, shadow, and Preload
  • Use enumeration tools to identify security vulnerabilities
  • Perform advanced Windows privilege escalation and command-line exploits
  • Learn post-exploitation persistence and credential harvesting
  • Learn how to prevent privilege escalation attacks

By the end of this course, you'll have hands-on experience elevating privileges across a wide range of systems, preparing you for advanced penetration testing work and industry certifications.

Who Is This Course For

This course is ideal for students preparing for the OSCP or other advanced certifications, penetration testers seeking deeper knowledge in privilege escalation, and cybersecurity professionals who want to level up their ethical hacking skills.

Course Instructor

Atil Samancioglu

Atil Samancioglu trains over 200,000 students in Development, Mobile Applications, and Cyber Security. He is an instructor at Bogazici University, where he graduated in 2010, and the co-founder and CEO of Kolektif Academy, an education start-up in Turkey.

Atil is passionate about code literacy and believes that everyone, regardless of their background or current job, should learn programming to stay relevant in the digital age.

He encourages those with innovative mobile application ideas, aspiring software developers, and future cybersecurity specialists to pursue their dreams through his highly-rated courses.

Atil's dedication to teaching and commitment to student success make him a valuable resource in tech education.

Read More

Read Less

Testimonials

Anonymous
β˜…β˜…β˜…β˜…β˜…

Kerry K.

Great course so far!

I knew nothing about privesc but Atil explained things in a way that made me understand. I recommend this course 100%.

Anonymous
β˜…β˜…β˜…β˜…β˜…

Cedric R.

Really clear explanations about the course and where to find the tools.

Anonymous
β˜…β˜…β˜…β˜…β˜…

Ricardo E.

So far enjoying the course, very useful stuff to learn about CTFs. Great work.

Show More

Show Less

Frequently Asked Questions

Students Who Took This Course Also Liked

Guarantee Your Cyber Security Career with the StationX Master’s Program!

Get real work experience and a job guarantee in the StationX Master’s Program. Dive into tailored training, mentorship, and community support that accelerates your career.

  • Job Guarantee & Real Work Experience: Launch your cybersecurity career with guaranteed placement and hands-on experience within our Master’s Program.
  • 30,000+ Courses and Labs: Hands-on, comprehensive training covering all the skills you need to excel in any role in the field.
  • Pass Certification Exams: Resources and exam simulations that help you succeed with confidence.
  • Mentorship and Career Coaching: Personalized advice, resume help, and interview coaching to boost your career.
  • Community Access: Engage with a thriving community of peers and professionals for ongoing support.
  • Advanced Training for Real-World Skills: Courses and simulations designed for real job scenarios.
  • Exclusive Events and Networking: Join events and exclusive networking opportunities to expand your connections.

TAKE THE NEXT STEP IN YOUR CAREER TODAY!

>

StationX Accelerator Pro

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Pro Program. Stay tuned for more!

StationX Accelerator Premium

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Premium Program. Stay tuned for more!

StationX Master's Program

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Master’s Program. Stay tuned for more!