Linux Privilege Escalation
Root account has full administrative access to operating system
Initial entry is through a low privilege account/shell
Target machine might have misconfigurations
SUID (Set User ID) Permission
Allows low privileged users to run exe with file system permissions of the owner (run as root)
Exe installed globally by the system
Example: Ping
Common examples are mount, cp, nano, ping
[Manual] Using Find to execute root commands
First we set SUID bit for executable Find (this will be our attack vector)
Leverage Find to execute root commands:
LinPeas
Linpeas.sh --> automated script for Linux Priv Escalations that runs alot of checks for vulnerabilities
searches password, writable files
Go to Interesting Files --> SUID
Last updated