ESCALATE_LINUX: 1 Walkthrough

Escalate_Linux — A intentionally developed Linux vulnerable virtual machine.The main focus of this machine is to learn Linux Post…

Escalate_Linux — A intentionally developed Linux vulnerable virtual machine.The main focus of this machine is to learn Linux Post Exploitation (Privilege Escalation) Techniques.

“Escalate_Linux” A Linux vulnerable virtual machine contains different features as.

  1. 12+ ways of Privilege Escalation
  2. Vertical Privilege Escalation
  3. Horizontal Privilege Escalation
  4. Multi-level Privilege Escalation
Escalate_Linux: 1
This website uses 'cookies' to give you the best, most relevant experience. Using this website means you're happy with…

Enumeration

  • Enumerate the HTTP service using Gobuster, we will find the shell.php

This will bring up the reverse shell

This will be point where we get into the system.


Privilege Escalation

  1. Exploiting SUID File
  2. Cracking Root password
  3. Exploiting SUDO with changing the path variable
  4. Exploiting Crontab
  5. SUDO Elevate Privilege
  6. Writable /etc/passwd