
Sign up to save your podcasts
Or
In this episode of 401 Access Denied, we're joined by Carlos Polop, security researcher and creator of Privilege Escalation Awesome Script Suite (PEASS). Seen recently with the Linux "Dirty Pipe" vulnerability exploitation, it's become critical to learn how attackers exploit privilege escalation flaws. Carlos shares how pen testers can use LinPEAS and WinPEAS to expose vulnerabilities in CTF environments. Additionally, learn how you can contribute to his research in the penetration testing community.
Check out Carlos' book: https://book.hacktricks.xyz/
Follow Carlos on GitHub & submit pull requests: https://github.com/carlospolop
Join Carlos' Discord community: https://discord.gg/hRep4RUj7f
Follow Carlos on Twitter: https://twitter.com/carlospolopm
Connect with Delinea:
Delinea Website
Delinea
Delinea Twitter
Delinea Facebook
Delinea YouTube
4.6
2626 ratings
In this episode of 401 Access Denied, we're joined by Carlos Polop, security researcher and creator of Privilege Escalation Awesome Script Suite (PEASS). Seen recently with the Linux "Dirty Pipe" vulnerability exploitation, it's become critical to learn how attackers exploit privilege escalation flaws. Carlos shares how pen testers can use LinPEAS and WinPEAS to expose vulnerabilities in CTF environments. Additionally, learn how you can contribute to his research in the penetration testing community.
Check out Carlos' book: https://book.hacktricks.xyz/
Follow Carlos on GitHub & submit pull requests: https://github.com/carlospolop
Join Carlos' Discord community: https://discord.gg/hRep4RUj7f
Follow Carlos on Twitter: https://twitter.com/carlospolopm
Connect with Delinea:
Delinea Website
Delinea
Delinea Twitter
Delinea Facebook
Delinea YouTube
1,998 Listeners
210 Listeners
1,522 Listeners
369 Listeners
227,745 Listeners
1,017 Listeners
320 Listeners
8,205 Listeners
7,958 Listeners
174 Listeners
188 Listeners
315 Listeners
40 Listeners
29,342 Listeners
40 Listeners