Skip to content

Latest commit

 

History

History
78 lines (43 loc) · 4.68 KB

File metadata and controls

78 lines (43 loc) · 4.68 KB
description
This is a post compromise goal where a threat actor is attempting to achieve root or administrator level access.

🤓 Privilege Escalation

Goal: low priv -> root/administrator

This can be simple as a kernel exploit or require lots of recon on the compromised system.

Privilege escalation is essentially an example of access control violations.

Linux Privilege Escalation

{% content-ref url="linux/" %} linux {% endcontent-ref %}

Linux Privilege Escalation Guides

The only guide I probably ever used to help me understand privilege escalation techniques in Linux systems was from g0tmi1k post.

This blog is a must that everyone should have for preparing for the OSCP in my opinion. You can find his guide here: https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/

GTFOBins (I have to thank Ippsec for sharing this with me): Contains a curated list of Unix binaries that that have the ability to be exploited by an attacker to bypass local security restrictions on a Linux system. https://gtfobins.github.io/

PayloadsAllTheThings Linux Priv Esc Guide: https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md

Linux Privilege Escalation Tools:

LinEnum: A great Linux privilege escalation checker that is still maintained by the guys at rebootuser.com. You can find there tool here: https://github.com/rebootuser/LinEnum

Windows Privilege Escalation

{% content-ref url="windows/" %} windows {% endcontent-ref %}

Windows Privilege Escalation Guides

Windows Privilege Escalation Tools: