exploitation common linux privilege escalation - dvanmosselbeen/security-cheat-sheet GitHub Wiki
Common Linux Privilege Escalation List
A list of common Linux Privilege Escalation.
Table of Contents
Enumeration
Tools can help to find out misconfiguration vulnerabilities and ways for privilege escalation.
Tools to enumerate:
- linpease - Linux Privilege Escalation Awesome Script
- pspy - unprivileged Linux process snooping
- LinEnum - Scripted Local Linux Enumeration & Privilege Escalation Checks
- LSE - Linux enumeration tools for pentesting and CTFs
SUID / GUID files
- See the dedicated document exploiting-suid-guid-files.
sudo
By running sudo -l we get to know what this user is allowed to do. In this example, user8 is allowed to run vi with root privileges. Assuming this has been set this way so that user8 could for example edit system config files. And the bad thing in this example, is that it also does not require user8 to enter a passwords.
user8@polobox:~$ sudo -l
Matching Defaults entries for user8 on polobox:
env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin
User user8 may run the following commands on polobox:
(root) NOPASSWD: /usr/bin/vi
From this user8 can run vi, and then spawn a shell. There are multiples methods possible.
Directly by running the sudo vi command and spawning a shell:
user8@polobox:~$ sudo vi -c ':!/bin/sh'
# whoami
root
From within vi by running sudo vi.
And then in the vi(m) editor, type in: :!sh
See also the gtfobins website, dedicated vi page for more details: https://gtfobins.github.io/gtfobins/vi/
Exploiting writeable /etc/passwd
- See the dedicated document Exploiting Writeable /etc/passwd.
Exploiting Crontab
This consist in looking what crontab run in the hope to find some cron job / script that is run with root user. A script which we are allowed to edit, and thus do vertical privilege escalating.
Resources
Other:
- netbiosX (check the other documents, this one is almost empty) Note, website is listed as malware - https://github.com/netbiosX/Checklists/blob/master/Linux-Privilege-Escalation.md
- On Payload All things - https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md
- https://sushant747.gitbooks.io/total-oscp-guide/content/privilege_escalation_-_linux.html
- https://payatu.com/guide-linux-privilege-escalation