syselement's Blog
search
⌘Ctrlk
🏠 Home BlogXGitHubπŸ“š Buy Me a BookπŸ“§ Contact
syselement's Blog
  • 🏠Home
  • πŸ”³Operating Systems
    • 🐧Linux
    • πŸͺŸWindows
  • πŸ“Courses Notes
    • eLearnSecurity / INE
    • Practical Networking
    • TCM Security
  • πŸ–₯️Cyber Everything
    • πŸ“ŒGeneric Resources
    • πŸ“±Mobile
    • 🧬Network
      • Commands
        • Linux Privesc Commands
        • Networking Commands
    • 🌐Web
    • ✍️Writeups & Walkthroughs
  • ♾️DevOps Everything
    • πŸ”—DevOps Resources
  • πŸ”¬Home Lab
    • πŸ–₯️Hypervisors
    • πŸ”΄Offensive Labs
    • πŸ”΅Defensive Labs
    • βšͺMisc Labs
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. πŸ–₯️Cyber Everythingchevron-right
  2. 🧬Networkchevron-right
  3. Commands

Linux Privesc Commands


hashtag
🌐 Resources πŸ”—

  • Ignitetechnologies/Privilege-Escalationarrow-up-right

  • Linux - Privilege Escalation - Internal All The Thingsarrow-up-right

  • PEASS-ng/linPEASarrow-up-right

  • Basic Linux Privilege Escalation - g0tmi1karrow-up-right

  • Linux Privilege Escalation – Resources – Siren Securityarrow-up-right

  • unix-privesc-check | pentestmonkeyarrow-up-right

  • TryHackMe | Linux Privilege Escalationarrow-up-right

  • Privilege Escalation on Linux (With Examples)arrow-up-right

Courses

  • Linux Privilege Escalation for OSCP & Beyond! | Tib3rius (One-Time Purchase)arrow-up-right

  • Linux Privilege Escalation | TCM Security, Inc.arrow-up-right


...


PreviousCommandschevron-leftNextNetworking Commandschevron-right

Last updated 1 month ago

# https://www.exploit-db.com/exploits/1518
cd /home/user/tools/mysql-udf
gcc -g -c raptor_udf2.c -fPIC
gcc -g -shared -Wl,-soname,raptor_udf2.so -o raptor_udf2.so raptor_udf2.o -lc
ls -l /etc/shadow
# Bruteforce hashes or if world-writable, generate new password and replace root pw
mkpasswd -m sha-512 pwhere

ls -l /etc/passwd
# If world-writable, generate new password and replace root pw
openssl passwd pwhere
sudo -l
# https://gtfobins.github.io/

cat /etc/crontab
# check file/scripts permissions, path environment variable
find / -user root -perm -4000 -exec ls -ldb {} \; 2>/dev/null
find / -type f -a \( -perm -u+s -o -perm -g+s \) -exec ls -l {} \; 2> /dev/null
find / -type f -perm -4000 2>/dev/null

# https://www.exploit-db.com/