web analytics

Linux Privilege Escalation

Rate this post

Introduction to Linux Privilege Escalation

The document outlines various techniques for escalating privileges on Linux systems. It covers methods such as exploiting Docker and LXD for privilege escalation, including mounting host system files in Docker images and creating attacker machines within LXD. Additionally, it delves into enumeration and escalation strategies, focusing on stabilizing shells, escaping restrictions, and manipulating environment variables.

Furthermore, the document discusses specific escalation techniques like PATH manipulation and object injection, providing insights into shared libraries and runtime loading. It also explores session hijacking through Screen and Tmux, enabling attackers to seize control of privileged sessions. Overall, the document serves as a comprehensive guide to understanding and executing privilege escalation on Linux systems.

Views: 3

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post