In this course, I will teach how to do Privilege Escalate from a Linux OS. We will go over around 30 privilege escalation we can perform from a Linux OS. This training will help you achieve your OSCP, how to prevent Privilege Escalation, and how to perform them, too. Privilege escalation happens when a malicious user exploits a bug, design flaw, or configuration error in an application or operating system to gain elevated access to resources that should normally be unavailable to that user. The attacker can then use the newly gained privileges to steal confidential data, run administrative commands or deploy malware.
install network tools:
sudo apt install net-tools
Also, you want to delete all the encrypted passwords in / etc / passwd and the users created with root access
find / -type f -perm 0777 2>/tmp/null
In cryptography, a salt is random data that is used as an additional input to a one-way function that hashes data, a password or passphrase. Salts are used to safeguard passwords in storage
sudo apt-get install -y hashcat
curl https://samsclass.info/123/proj10/500_passwords.txt > 500_passwords.txt
more command is used to view the text files in the command prompt, displaying one screen at a time in case the file is large (For example log files).
On Linux systems, less is a command that displays file contents or command output one page at a time in your terminal. less is most useful for viewing the content of large files or the results of commands that produce many lines of output.
Awk is a scripting language used for manipulating data and generating reports.The awk command programming language requires no compiling, and allows the user to use variables, numeric functions, string functions, and logical operators.
Stream EDitor (Sed), one of the most prominent text-processing utilities on GNU/Linux. Similar to many other GNU/Linux utilities, it is stream-oriented and uses simple programming language. It is capable of solving complex text processing tasks with few lines of code. This easy, yet powerful utility makes GNU/Linux more interesting.
sudo sed -i 's/root:x:/root:$1$l2MrJFqr$8sMN9lsMvK6Vqt9qsDQoV1:/g' /etc/passwd
Download Lin Security Here:
https://in.security/lin-security-practise-your-linux-privilege-escalation-foo/
Download Machine here:
https://in.security/lin-security-practise-your-linux-privilege-escalation-foo/
https://www.sans.org/reading-room/whitepapers/linux/attack-defend-linux-privilege-escalation-techniques-2016-37562
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.