- Популярные видео
- Авто
- Видео-блоги
- ДТП, аварии
- Для маленьких
- Еда, напитки
- Животные
- Закон и право
- Знаменитости
- Игры
- Искусство
- Комедии
- Красота, мода
- Кулинария, рецепты
- Люди
- Мото
- Музыка
- Мультфильмы
- Наука, технологии
- Новости
- Образование
- Политика
- Праздники
- Приколы
- Природа
- Происшествия
- Путешествия
- Развлечения
- Ржач
- Семья
- Сериалы
- Спорт
- Стиль жизни
- ТВ передачи
- Танцы
- Технологии
- Товары
- Ужасы
- Фильмы
- Шоу-бизнес
- Юмор
How Hackers Silently Take Over Linux Machines
In this video we are doing a complete masterclass on SUID and SGID, two of the most important and most abused Linux permissions in cybersecurity. Whether you are just getting started with Linux and want to understand how Linux permissions and root access actually work, or you are already into ethical hacking and penetration testing and want to understand how privilege escalation actually happens on a real machine, this video covers it all.
We start from the very basics. We talk about how Linux controls what a program is allowed to do, what root access actually means, and why permissions like SUID and SGID exist in the first place. No prior knowledge needed, everything is explained from the ground up.
Once the concept is clear, we move into the exploitation side. We look at how attackers find SUID binaries on a Linux machine using the find command, how to use GTFOBins to figure out what you can do with those binaries, and what two directions you can go depending on what you find. We cover the nano exploitation path, the find exploitation path, and then practically exploit the base64 binary to read the /etc/shadow file and extract password hashes. We then use John the Ripper to crack those hashes and get access to another user on the machine.
This is the kind of stuff that comes up constantly in CTFs, TryHackMe rooms, penetration testing engagements, and real world linux privilege escalation scenarios. So whether you are preparing for a CTF, studying for OSCP, learning ethical hacking, or just want to understand how linux security and misconfigurations work, this is the video for you.
Timestamps:
soon!
--
#cybersecurity #linux #hacker
red team linux, post exploitation, linux hardening, privilege escalation techniques, OSCP preparation, ethical hacking for beginners, linux tutorial, how to hack linux, setuid exploitation, linux capability
Видео How Hackers Silently Take Over Linux Machines канала Abdul Hadi
We start from the very basics. We talk about how Linux controls what a program is allowed to do, what root access actually means, and why permissions like SUID and SGID exist in the first place. No prior knowledge needed, everything is explained from the ground up.
Once the concept is clear, we move into the exploitation side. We look at how attackers find SUID binaries on a Linux machine using the find command, how to use GTFOBins to figure out what you can do with those binaries, and what two directions you can go depending on what you find. We cover the nano exploitation path, the find exploitation path, and then practically exploit the base64 binary to read the /etc/shadow file and extract password hashes. We then use John the Ripper to crack those hashes and get access to another user on the machine.
This is the kind of stuff that comes up constantly in CTFs, TryHackMe rooms, penetration testing engagements, and real world linux privilege escalation scenarios. So whether you are preparing for a CTF, studying for OSCP, learning ethical hacking, or just want to understand how linux security and misconfigurations work, this is the video for you.
Timestamps:
soon!
--
#cybersecurity #linux #hacker
red team linux, post exploitation, linux hardening, privilege escalation techniques, OSCP preparation, ethical hacking for beginners, linux tutorial, how to hack linux, setuid exploitation, linux capability
Видео How Hackers Silently Take Over Linux Machines канала Abdul Hadi
SUID linux SGID linux linux privilege escalation SUID exploitation GTFOBins ethical hacking penetration testing linux for beginners cybersecurity tutorial how hackers get root access base64 privilege escalation john the ripper shadow file linux find SUID binaries linux misconfigurations linux permissions explained effective UID real UID CTF walkthrough TryHackMe linux security
Комментарии отсутствуют
Информация о видео
4 апреля 2026 г. 16:53:27
00:54:06
Другие видео канала




















