Linux Privilege Escalation
Learn how to escalate from a low-privileged shell to root access on Linux systems. This path covers both manual enumeration techniques and automated tools, preparing you for CTFs and real-world penetration tests. You'll understand why these vulnerabilities exist and how to identify them quickly during engagements.
Prerequisites
Course Content
System Enumeration
Gathering information for privilege escalation
SUID/SGID Exploitation
Exploiting misconfigured SUID and SGID binaries
Sudo Exploitation
Exploiting sudo misconfigurations
Scheduled Tasks & Cron
Exploiting cron jobs and scheduled tasks
Kernel Exploitation
Exploiting kernel vulnerabilities for root
Miscellaneous Techniques
Other privilege escalation vectors
Linux Capabilities
Exploiting misconfigured capabilities
NFS Privilege Escalation
Exploiting NFS misconfigurations
Docker Privilege Escalation
Escaping containers and exploiting docker group
LXD/LXC Privilege Escalation
Exploiting LXD group for root access
Ready to start?
Begin your journey with the first lesson. Your progress is saved automatically.
Start Learning