πŸ”§Miscellaneous Techniques

🎯 Overview

Additional Linux privilege escalation techniques including traffic capture, NFS exploitation, and tmux session hijacking for comprehensive privilege escalation coverage.

πŸ“‘ Passive Traffic Capture

Network Sniffing for Credentials

# Check if tcpdump available and usable
which tcpdump
tcpdump --version

# Capture network traffic
tcpdump -i any -w capture.pcap

# Real-time credential hunting
tcpdump -i any -A | grep -E "(password|user|login|auth)"

# Capture specific protocols
tcpdump -i any port 21    # FTP
tcpdump -i any port 23    # Telnet  
tcpdump -i any port 80    # HTTP

Tools for Credential Extraction

πŸ—‚οΈ Weak NFS Privileges

NFS Export Enumeration

Check NFS Configuration

NFS Privilege Escalation

πŸ“Ί Tmux Session Hijacking

Find Tmux Sessions

Session Hijacking

Create Hijackable Session (for persistence)

πŸ” Detection & Enumeration

Miscellaneous Techniques Check

NFS Specific Enumeration

πŸš€ Quick Exploitation Reference

Immediate Opportunities

Emergency Techniques

πŸ”‘ Key Points

Traffic Capture Value

  • Cleartext protocols - HTTP, FTP, Telnet, SMTP

  • Authentication hashes - NTLM, Kerberos for cracking

  • SNMP community strings - Network device access

  • Database connections - Application credentials

NFS Exploitation Impact

  • SUID binary upload - Direct root privilege escalation

  • Configuration modification - System file access

  • Data exfiltration - Sensitive file access

Tmux Session Benefits

  • Inherited privileges - Session creator's permissions

  • Persistent access - Session survives disconnection

  • Command history - Previous commands and data

  • Active processes - Running privileged tasks


Miscellaneous techniques cover edge cases and specialized scenarios - traffic capture, NFS misconfigurations, and session hijacking provide additional privilege escalation vectors in specific environments.

Last updated