This paper intends to provide multiple techniques that pentester can use to escalate their privileges and gain access to higher roles in Linux based operating systems.
Key Pointers:
- Linux Privilege Escalation can be of many types. The types discussed in this document are:
- Privilege Escalation by kernel exploit
- Privilege Escalation by Password Mining
- Privilege Escalation by Sudo
- Privilege Escalation by File Permissions
- Privilege Escalation by Crontab
- Setting up labs and performing the escalations.
- Discussing the mitigations to prevent such privilege escalation exploits.