# Linux Exploitation

- [Introduction](https://ecpptv2-certification.certs-study.com/linux-exploitation/introduction.md)
- [Information Gathering](https://ecpptv2-certification.certs-study.com/linux-exploitation/information-gathering.md)
- [Remote Enumeration](https://ecpptv2-certification.certs-study.com/linux-exploitation/information-gathering/remote-enumeration.md)
- [Enum NFS](https://ecpptv2-certification.certs-study.com/linux-exploitation/information-gathering/remote-enumeration/enum-nfs.md)
- [rpcbind](https://ecpptv2-certification.certs-study.com/linux-exploitation/information-gathering/remote-enumeration/rpcbind.md)
- [SMB](https://ecpptv2-certification.certs-study.com/linux-exploitation/information-gathering/remote-enumeration/smb.md)
- [SMTP](https://ecpptv2-certification.certs-study.com/linux-exploitation/information-gathering/remote-enumeration/smtp.md)
- [Local Enumeration](https://ecpptv2-certification.certs-study.com/linux-exploitation/information-gathering/local-enumeration.md)
- [Network Info](https://ecpptv2-certification.certs-study.com/linux-exploitation/information-gathering/local-enumeration/network-info.md)
- [System Info](https://ecpptv2-certification.certs-study.com/linux-exploitation/information-gathering/local-enumeration/system-info.md)
- [Exploitation over the Network](https://ecpptv2-certification.certs-study.com/linux-exploitation/exploitation-over-the-network.md)
- [Samba](https://ecpptv2-certification.certs-study.com/linux-exploitation/exploitation-over-the-network/samba.md)
- [UserMap CVE-2007-2447](https://ecpptv2-certification.certs-study.com/linux-exploitation/exploitation-over-the-network/samba/usermap-cve-2007-2447.md)
- [SymLink Directory Traversal](https://ecpptv2-certification.certs-study.com/linux-exploitation/exploitation-over-the-network/samba/symlink-directory-traversal.md)
- [SambaCry CVE-2017-7494](https://ecpptv2-certification.certs-study.com/linux-exploitation/exploitation-over-the-network/samba/sambacry-cve-2017-7494.md)
- [Writeable Share to RCE](https://ecpptv2-certification.certs-study.com/linux-exploitation/exploitation-over-the-network/samba/writeable-share-to-rce.md)
- [PHP CGI](https://ecpptv2-certification.certs-study.com/linux-exploitation/exploitation-over-the-network/php-cgi.md)
- [Ruby DRB RMI port 8787](https://ecpptv2-certification.certs-study.com/linux-exploitation/exploitation-over-the-network/ruby-drb-rmi-port-8787.md)
- [JAVA RMI Registry - port 1099](https://ecpptv2-certification.certs-study.com/linux-exploitation/exploitation-over-the-network/java-rmi-registry-port-1099.md): Java RMI Server Insecure Default Configuration Java Code Execution
- [Exploiting Java Deserialization](https://ecpptv2-certification.certs-study.com/linux-exploitation/exploitation-over-the-network/exploiting-java-deserialization.md)
- [TomCat](https://ecpptv2-certification.certs-study.com/linux-exploitation/exploitation-over-the-network/tomcat.md)
- [Password Spray Attack](https://ecpptv2-certification.certs-study.com/linux-exploitation/exploitation-over-the-network/password-spray-attack.md)
- [Shellshock](https://ecpptv2-certification.certs-study.com/linux-exploitation/exploitation-over-the-network/shellshock.md): CVE-2014-6271
- [Heartbleed](https://ecpptv2-certification.certs-study.com/linux-exploitation/exploitation-over-the-network/heartbleed.md): The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library.
- [Post Exploitation](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation.md)
- [Intro](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/intro.md)
- [msfconsole scripts](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/msfconsole-scripts.md)
- [Privilege Escalation](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/privilege-escalation.md)
- [Docker](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/privilege-escalation/docker.md)
- [Unix Sockets Exploitation](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/privilege-escalation/docker/unix-sockets-exploitation.md)
- [Restricted Shells](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/privilege-escalation/restricted-shells.md)
- [Cracking Shadow File](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/privilege-escalation/cracking-shadow-file.md)
- [Dump Memory Credentials](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/privilege-escalation/dump-memory-credentials.md)
- [Dump SWAP Credentials](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/privilege-escalation/dump-swap-credentials.md)
- [Shared Object Libraries](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/privilege-escalation/shared-object-libraries.md)
- [Kernel Exploits](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/privilege-escalation/kernel-exploits.md)
- [Dirty Cow](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/privilege-escalation/kernel-exploits/dirty-cow.md)
- [Stack Clash](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/privilege-escalation/kernel-exploits/stack-clash.md): The Stack Clash is a vulnerability in the memory management of several operating systems.
- [DCCP](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/privilege-escalation/kernel-exploits/dccp.md): Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation
- [Race Condition](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/privilege-escalation/kernel-exploits/race-condition.md): Linux kernel < 4.10.15 - Race Condition Privilege Escalation
- [msfconsole](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/privilege-escalation/kernel-exploits/msfconsole.md)
- [Lateral Movement](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/lateral-movement.md)
- [Samba](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/lateral-movement/samba.md)
- [Dump Samba Secrets](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/lateral-movement/samba/dump-samba-secrets.md)
- [SSH](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/lateral-movement/ssh.md)
- [SSH Hijacking](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/lateral-movement/ssh/ssh-hijacking.md)
- [Steal SSH credentials](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/lateral-movement/ssh/steal-ssh-credentials.md)
- [VPNPivot](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/lateral-movement/vpnpivot.md)
- [Dump Firefox Credentials](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/lateral-movement/dump-firefox-credentials.md)
- [Sniffing](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/lateral-movement/sniffing.md)
- [Data Exfiltration](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/data-exfiltration.md)
- [Maintaining Access](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/maintaining-access.md)
- [HTTPS](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/maintaining-access/https.md)
- [Reverse Shells](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/maintaining-access/reverse-shells.md)
- [Custom Services](https://ecpptv2-certification.certs-study.com/linux-exploitation/post-exploitation/maintaining-access/custom-services.md)
