OSCP – Linux Introduction Introduction to the Linux Shell File System Permissions Reverse Shells in Linux Exploitation Techniques PATH Hijacking SUID Exploitation SUDO Exploitation Wildcard Expansion Exploitation Enumeration System Enumeration Cronjob Enumeration Capabilities Enumeration More Exploitation Local Service Exploitation Linux Binary Exploitation Linux Kernel Exploitation Extra Unshadow Attack