100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Summary

Linux priviledge Escalation summary

Rating
-
Sold
1
Pages
3
Uploaded on
26-07-2024
Written in
2023/2024

The document is a concise guide on various techniques for escalating privileges on a Linux machine. It provides practical steps and commands for each technique, along with links to valuable resources for further research

Content preview

Privilege Escalation Techniques on a Linux Machine

There are different ways to escalate privileges on a Linux machine. Below
are notes on some methods you can use:

Note: Very resourceful links: TryHackMe, GTFOBins




1. Exploiting Outdated Kernel Versions

- To view the existing kernel information on a Linux machine, use
commands like (uname -a, cat /proc/version
- Then search the web for vulnerabilities relating to that specific
kernel version. Use websites like ExploitDB, Rapid7, CVE Details, NVD,
MITRE ATT&CK, and SecurityFocus. Download the script from any of
these sites to your device, then transfer it using python -m
http.server and wget commands. Finally, run the script on the target
machine (./script.py)



2. Leveraging Commands with SUDO Privileges

- often lower end users are given SUDO priviledges when using
certain commands like (find, locate and so on)
- using sudo -l you can list all the commands that have sudo
priviledges
- when those commands are listed, using gtfo bins
(https://gtfobins.github.io/), we can search for additional commands
we can run when using that command to enable us leverage our
privilege(for example, if the find command on a machine has sudo
priviledges, we go to gtfo bins, search for the find and click on the
sudo function under the sudo function section there are commands
which can be executed to grant privilege escalation to the attacker.
- when the command is run we gain root access.
-

3. Gaining Privilege Escalation Using Files with Read, Write, and Execute
Permissions(e.g vim, base64, nano)

- Firstly, we find files that have read, write and executable privileges
by inputting the command find / -type f -perm -04000 -ls 2>/dev/null.

Document information

Uploaded on
July 26, 2024
Number of pages
3
Written in
2023/2024
Type
SUMMARY
£4.26
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
israel4

Get to know the seller

Seller avatar
israel4
View profile
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
1 year
Number of followers
1
Documents
1
Last sold
1 year ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions