To access material, start machines and answer questions login.
Introduction
In the Privilege Escalation: Enumeration room, you built a foundation in enumeration — learning how to survey a system for misconfigurations, weak permissions, and potential escalation vectors. Now it's time to act on what you found.
This room picks up where the Privilege Escalation: Enumeration room left off. You'll take the same kinds of misconfigurations you learned to spot and actually exploit them to escalate from a low-privileged user to root. Each section focuses on a different vector: abusing sudo permissions, leveraging SUID binaries, hijacking the PATH variable, exploiting writable cron jobs, taking advantage of capabilities, and misconfigured NFS shares.
Note: Each task will have it’s own target machine. Make sure to always spin up the new target machine matching the task.
Prerequisites
- Fundamentals module
- Privilege Escalation: Enumeration room
Learning Objectives
- Understand basic privilege escalation vectors
- Understand the impact of privilege escalation
- Demonstrate manual exploitation for privilege escalation
Ready to escalate privileges!
Ready to learn Cyber Security?
The Linux Privilege Escalation: Basics room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
