Priv Escalation

Privilege Escalation

https://payatu.com/guide-linux-privilege-escalation

Linux Privilege Escalation

  • sudo -l

  • Kernel Exploits

  • OS Exploits

  • Password reuse (mysql, .bash_history, 000-default.conf...)

  • Known binaries with suid flag and interactive (nmap)

  • Custom binaries with suid flag either using other binaries or with command execution

  • Writable files owned by root that get executed (cronjobs)

  • MySQL as root

  • Vulnerable services (chkrootkit, logrotate)

  • Writable /etc/passwd

  • Readable .bash_history

  • SSH private key

  • Listening ports on localhost

  • /etc/fstab

  • /etc/exports

  • /var/mail

  • Process as other user (root) executing something you have permissions to modify

  • SSH public key + Predictable PRNG

  • apt update hooking (Pre-Invoke)

  • Capabilities

Windows Privilege Escalation

  • Kernel Exploits

  • OS Exploits

  • Pass The Hash

  • Password reuse

  • DLL hijacking (Path)

  • Vulnerable services

  • Writable services binaries path

  • Unquoted services

  • Listening ports on localhost

  • Registry keys

Kernel Exploits

Linux: https://github.com/lucyoa/kernel-exploits

Windows: https://github.com/abatchy17/WindowsExploits

Windows Add User

SUID Change

Window Exploit Suggester

Windows Priv Escalation

Basic Linux Enumeration

Last updated

Was this helpful?