Linux
This is a page dedicated to privilege escalation in unix based systems. Helpful hacktricks checklist: https://book.hacktricks.xyz/linux-hardening/linux-privilege-escalation-checklist
Tools
linPEAS.sh
LinEnum.sh
linuxprivchecker.py
unix-privesc-check
Mestaploit: multi/recon/local_exploit_suggesterCheck directories manually
/opt, /tmp, /home # look for password files, logs, interesting .shSystem information
hostname # get hostname
(cat /proc/version || uname -a ) 2>/dev/null # OS version, google for exploits
# you can get these information also from /etc/issue and /etc/*-release
lscpu # check architecture
ps aux # list processes
ps aux | grep root # list processes for given user
echo $PATH # check for write permission inside the path. Hijack binaries / libraries
find / -writable -type d 2>/dev/null # search for writeable directoriesUser information
Network enumeration
SUDO/Capabilities
SUID
GTFO Bins
Shared Object Injection
Symlinks (vulnerable software on the server)
Environmental Variables
Log inspection
Search for strings in binaries
Weak file permissions
Intended funcionallity
Escalation via LD_PRELOAD
Daemons
CVE 2019-14287
CVE 2019-18634
NO PASSWD File Replacement
Password hunting
Check root processes
Cron jobs
Cron Path
Cron Wildcards
File override
NFS Root Squashing
Docker
Drives
Kernel modules
Capture network traffic
Last updated