Linux Privilege Escalation via Automated Script
We all know that, after compromising the victim’s machine we have a low-privileges shell that we want to escalate into a higher-privileged shell and this process is known as Privilege Escalation. Today in this article we will discuss what comes under privilege escalation and how an attacker can identify that low-privileges shell can be escalated to higher-privileged shell. But apart from it, there are some scripts for Linux that may come in useful when trying to escalate privileges on a target system. This is generally aimed at enumeration rather than specific vulnerabilities/exploits. This type of script could save your much time.
Table of Content
- Introduction
- Vectors of Privilege Escalation
- LinuEnum
- Linuxprivchecker
- Linux Exploit Suggester 2
- Bashark
- BeRoot
Introduction
Basically privilege escalation is a phase that comes after the attacker has compromised the victim’s machine where he try to gather critical information related to system such as hidden password and weak configured services or applications and etc. All these information helps the attacker to make the post exploit against machine for getting higher-privileged shell.
Vectors of Privilege Escalation
- OS Detail & Kernel Version
- Any Vulnerable package installed or running
- Files and Folders with Full Control or Modify Access
- File with SUID Permissions
- Mapped Drives (NFS)
- Potentially Interesting Files
- Environment Variable Path
- Network Information (interfaces, arp, netstat)
- Running Processes
- Cronjobs
- User’s Sudo Right
- Wildcard Injection
Full Article Read Here