Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Linux Privilege Escalation: Basics

Premium room

Learn the fundamentals of Linux privilege escalation. From enumeration to exploitation, get hands-on with over 8 different privilege escalation techniques.

medium

75 min

391

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

Introduction

In the  Privilege Escalation: Enumeration room, you built a foundation in enumeration — learning how to survey a system for misconfigurations, weak permissions, and potential escalation vectors. Now it's time to act on what you found.

This room picks up where the Privilege Escalation: Enumeration room left off. You'll take the same kinds of misconfigurations you learned to spot and actually exploit them to escalate from a low-privileged user to root. Each section focuses on a different vector: abusing sudo permissions, leveraging SUID binaries, hijacking the PATH variable, exploiting writable cron jobs, taking advantage of capabilities, and misconfigured NFS shares.

Note: Each task will have it’s own target machine. Make sure to always spin up the new target machine matching the task.

Prerequisites

Learning Objectives

  • Understand basic privilege escalation vectors
  • Understand the impact of privilege escalation
  • Demonstrate manual exploitation for privilege escalation
Answer the questions below

Ready to escalate privileges!