
A Hands-on Approach to Linux Privilege Escalation
This paper intends to provide multiple techniques that pentester can use to escalate their privileges and gain access to higher roles in Linux based operating systems.
- Linux Privilege Escalation can be of many types. The types discussed in this document are:
- Privilege Escalation by kernel exploit
- Privilege Escalation by Password Mining
- Privilege Escalation by Sudo
- Privilege Escalation by File Permissions
- Privilege Escalation by Crontab
- Setting up labs and performing the escalations.
- Discussing the mitigations to prevent such privilege escalation exploits.
Brands that
trust our competence
Explore more













