On-Demand: Linux Privilege Escalation Bootcamp
Familiarize yourself with beginner-to-advanced privilege escalation techniques on Linux.
Recordings of this bootcamp are now available as part of our annual subscription. Subscribe to enjoy:
Recordings of this bootcamp are now available as part of our annual subscription. Subscribe to enjoy:
- Access to all on-demand bootcamps and relevant labs, including this one
- 2000+ hands-on labs covering another 130+ subtopics
Write your awesome label here.
Subscribe to access bootcamp recordings and more!
Accessible via our AttackDefense lab platform
Upon logging in to the AttackDefense lab platform, annual subscribers will be able to access recordings of all our on-demand bootcamps and associated labs.

Prerequisites
1. A basic knowledge of computers and networking
2. Familiarity with the Linux operating system
2. Familiarity with the Linux operating system

Module I: Basic Privilege Escalation Techniques Part I
Module II: Basic Privilege Escalation Techniques Part II
Module III: Breaking out of Restricted Environments
Module IV: Linux Capabilities
Meet the instructor
Jeswin Mathai
He has published his work at DEFCON China, RootCon, Blackhat Arsenal, and Demo labs (DEFCON). He has also been a co-trainer in classroom trainings conducted at HITB, RootCon, OWASP NZ Day. He has a Bachelor degree from IIIT Bhubaneswar. He was the team lead at InfoSec Society IIIT Bhubaneswar in association with CDAC and ISEA, which performed security auditing of government portals, conducted awareness workshops for government institutions. His area of interest includes Malware Analysis and Reverse Engineering, Cryptography, WiFi security, and Web Application Security.
Jeswin Mathai - Instructor
Get informed about future bootcamps!
Thank you!