This module covers comprehensive Linux privilege escalation techniques, methodologies, and tools. Linux privilege escalation is a critical skill for penetration testers, as it allows gaining elevated access on compromised Linux systems through various attack vectors.
β οΈ Note: Module includes advanced kernel exploitation techniques that should be used with extreme caution and proper understanding of system stability risks.
π Module Structure
linux-priv-esc/
βββ README.md # This overview file
βββ environment-enumeration.md # System reconnaissance and information gathering
βββ services-internals-enumeration.md # Deep system analysis and service enumeration
βββ credential-hunting.md # Systematic credential discovery across file system
βββ path-abuse.md # PATH variable manipulation and command hijacking
βββ wildcard-abuse.md # Wildcard character exploitation for privilege escalation
βββ escaping-restricted-shells.md # Techniques for breaking out of restricted shells
βββ special-permissions.md # SUID/SGID binary exploitation and GTFOBins
βββ sudo-rights-abuse.md # Sudo privilege misconfigurations and GTFOBins exploitation
βββ privileged-groups.md # LXD, Docker, Disk, ADM group privilege escalation
βββ capabilities.md # Linux capabilities privilege escalation exploitation
βββ vulnerable-services.md # Known service vulnerabilities and exploitation
βββ cron-job-abuse.md # Cron job misconfiguration exploitation
βββ lxd-container-escape.md # LXD container privilege escalation exploitation
βββ docker-container-escape.md # Docker container privilege escalation exploitation
βββ logrotate-exploitation.md # Logrotate vulnerability exploitation and race conditions
βββ miscellaneous-techniques.md # Additional techniques (traffic capture, NFS, tmux hijacking)
βββ shared-libraries.md # LD_PRELOAD shared library hijacking exploitation
βββ shared-object-hijacking.md # Custom library RUNPATH hijacking exploitation
βββ python-library-hijacking.md # Python module import hijacking exploitation
βββ sudo-cve-exploits.md # Sudo CVE exploitation (Baron Samedit, Policy Bypass)
βββ polkit-pwnkit.md # Polkit CVE-2021-4034 Pwnkit privilege escalation
βββ dirty-pipe.md # Dirty Pipe CVE-2022-0847 kernel vulnerability exploitation
βββ netfilter-kernel-exploits.md # Netfilter kernel module CVE exploits (advanced)
βββ linux-hardening.md # Defensive measures and system hardening practices
βββ permissions-based-privesc.md # File permissions, SUID/SGID exploitation
βββ service-based-privesc.md # Running services and process exploitation
βββ configuration-based-privesc.md # Misconfigurations and weak settings
βββ kernel-exploitation.md # Operating system vulnerabilities
βββ application-specific-privesc.md # Vulnerable installed software
βββ automated-tools.md # LinPEAS, LinEnum, and enumeration scripts
βββ persistence-techniques.md # Maintaining elevated access
βββ skills-assessment.md # Practical exercises and challenges
π Getting Started
Prerequisites
Basic Linux Knowledge: Command line familiarity
Initial Access: Shell on target Linux system
Methodology Understanding: Systematic approach to enumeration
Tool Familiarity: Common privilege escalation tools
Attack Flow
π Module Content
β Completed Sections
π Complete Coverage: 24 privilege escalation techniques from basic enumeration to advanced kernel exploitation
This comprehensive Linux Privilege Escalation module covers 24 complete techniques ranging from basic enumeration to advanced kernel exploitation, providing thorough coverage of all major privilege escalation vectors in Linux environments.
Successfully escalate privileges on various Linux distributions
Identify and exploit SUID/SGID vulnerabilities
Abuse service misconfigurations for privilege escalation
Utilize kernel exploits safely and effectively (with caution for advanced techniques)
Establish persistent elevated access
Master 24 different privilege escalation techniques including advanced kernel exploits and defensive hardening
This Linux Privilege Escalation module provides comprehensive coverage of techniques, tools, and methodologies for gaining elevated privileges on Linux systems, essential for penetration testers and security professionals.