From a low-privileged shell to root. SUID, cron, capabilities, sudo misconfigs and kernel exploits.
Why this matters right now
Linux PrivEsc — a key skill for every pentester
After the course you will be able to
Not abstract knowledge — concrete skills you can demonstrate in an interview
Real attacks in the course
Every lesson is built on real incidents — not made-up examples
DirtyCow (CVE-2016-5195)
A race condition in the Linux kernel allowed an unprivileged user to gain root. Millions of Android devices and Linux servers were affected.
Sudo Baron Samedit (CVE-2021-3156)
A heap-based buffer overflow in sudo allowed gaining root on Ubuntu, Fedora and Debian without knowing the password. The vulnerability existed for 10 years.
HTB: typical PrivEsc chain
On real HackTheBox machines the classic chain is: SUID binary → PATH hijacking → sudo -l → root. These are exactly the techniques taught in the course.
Course Program
3 modules · 12 lessons · from basic recon to kernel exploits
Where this course leads
MC-03 — an essential skill for three career paths in cybersecurity
Pentester
Conduct a full attack cycle: from recon to root on target Linux systems.
Red Team Operator
Simulate APT group attacks, escalate privileges in corporate Linux infrastructures.
CTF Player
Solve Linux PrivEsc challenges in CTF competitions and earn prizes and recognition.
Who this course is for
Pentesters
Want to close the PrivEsc gap and confidently get root on Linux in real engagements
Red Teamers
Studying advanced post-exploitation techniques for APT attack simulation
CTF Players
Want to confidently solve Linux PrivEsc challenges in competitions and CTF platforms
Master Linux PrivEsc
and get root
today
12 lessons, linPEAS, GTFOBins and practice on real CTF machines.
Linux Privilege Escalation
Level: intermediate

