
Sign up to save your podcasts
Or
In this episode of 401 Access Denied, we're joined by Carlos Polop, security researcher and creator of Privilege Escalation Awesome Script Suite (PEASS). Seen recently with the Linux "Dirty Pipe" vulnerability exploitation, it's become critical to learn how attackers exploit privilege escalation flaws. Carlos shares how pen testers can use LinPEAS and WinPEAS to expose vulnerabilities in CTF environments. Additionally, learn how you can contribute to his research in the penetration testing community.
Check out Carlos' book: https://book.hacktricks.xyz/
Follow Carlos on GitHub & submit pull requests: https://github.com/carlospolop
Join Carlos' Discord community: https://discord.gg/hRep4RUj7f
Follow Carlos on Twitter: https://twitter.com/carlospolopm
Connect with Delinea:
Delinea Website
Delinea
Delinea Twitter
Delinea Facebook
Delinea YouTube
4.6
2626 ratings
In this episode of 401 Access Denied, we're joined by Carlos Polop, security researcher and creator of Privilege Escalation Awesome Script Suite (PEASS). Seen recently with the Linux "Dirty Pipe" vulnerability exploitation, it's become critical to learn how attackers exploit privilege escalation flaws. Carlos shares how pen testers can use LinPEAS and WinPEAS to expose vulnerabilities in CTF environments. Additionally, learn how you can contribute to his research in the penetration testing community.
Check out Carlos' book: https://book.hacktricks.xyz/
Follow Carlos on GitHub & submit pull requests: https://github.com/carlospolop
Join Carlos' Discord community: https://discord.gg/hRep4RUj7f
Follow Carlos on Twitter: https://twitter.com/carlospolopm
Connect with Delinea:
Delinea Website
Delinea
Delinea Twitter
Delinea Facebook
Delinea YouTube
1,971 Listeners
208 Listeners
1,499 Listeners
361 Listeners
225,447 Listeners
1,007 Listeners
311 Listeners
6,911 Listeners
7,865 Listeners
171 Listeners
187 Listeners
314 Listeners
40 Listeners
28,272 Listeners
38 Listeners