π§Miscellaneous Techniques
π― Overview
Additional Linux privilege escalation techniques including traffic capture, NFS exploitation, and tmux session hijacking for comprehensive privilege escalation coverage.
π‘ Passive Traffic Capture
Network Sniffing for Credentials
# Check if tcpdump available and usable
which tcpdump
tcpdump --version
# Capture network traffic
tcpdump -i any -w capture.pcap
# Real-time credential hunting
tcpdump -i any -A | grep -E "(password|user|login|auth)"
# Capture specific protocols
tcpdump -i any port 21 # FTP
tcpdump -i any port 23 # Telnet
tcpdump -i any port 80 # HTTPTools for Credential Extraction
ποΈ Weak NFS Privileges
NFS Export Enumeration
Check NFS Configuration
NFS Privilege Escalation
πΊ Tmux Session Hijacking
Find Tmux Sessions
Session Hijacking
Create Hijackable Session (for persistence)
π Detection & Enumeration
Miscellaneous Techniques Check
NFS Specific Enumeration
π Quick Exploitation Reference
Immediate Opportunities
Emergency Techniques
π Key Points
Traffic Capture Value
Cleartext protocols - HTTP, FTP, Telnet, SMTP
Authentication hashes - NTLM, Kerberos for cracking
SNMP community strings - Network device access
Database connections - Application credentials
NFS Exploitation Impact
SUID binary upload - Direct root privilege escalation
Configuration modification - System file access
Data exfiltration - Sensitive file access
Tmux Session Benefits
Inherited privileges - Session creator's permissions
Persistent access - Session survives disconnection
Command history - Previous commands and data
Active processes - Running privileged tasks
Miscellaneous techniques cover edge cases and specialized scenarios - traffic capture, NFS misconfigurations, and session hijacking provide additional privilege escalation vectors in specific environments.
Last updated