Linux Privilege Escalation
Comprehensive guide for escalating privileges on Linux systems
Table of Contents
System Enumeration#
Basic System Information#
| |
Running Processes#
| |
SUID/SGID Files#
Find SUID Binaries#
| |
Common SUID Exploits#
| |
Capabilities#
| |
Cron Jobs#
| |
Writable Files & Directories#
| |
PATH Hijacking#
| |
Kernel Exploits#
| |
Password Hunting#
| |
SSH Keys#
| |
Docker Escape#
| |
NFS Shares#
| |
Automated Tools#
| |
Useful One-Liners#
| |
[PROTOCOL] Always run automated enumeration tools first, then manually verify interesting findings.
[WARNING] Test exploits in isolated environments before production use.