Red/Blue Cheatsheet | NORI ZAMURAI
  • Introduction
  • Pentesting Cheatsheets
    • Reconnaissance
      • Other method
      • Nmap
    • Enumeration
      • DNS (53)
      • SSH (22)
      • FTP (21)
      • SMTP (25)
      • WEB (80,443)
      • POP3 (110)
      • SMB (139,445)
      • MySQL (3306)
    • Privilege Escalation
      • Linux
      • Windows
    • Shell
      • Reverse Shell
      • Upgrade Shell
      • Meterpreter
    • Password Crack
      • Hash Analysis
      • Bruteforce
    • Exploit
      • Search Exploit
      • Attacks
    • Paylaod
      • Msfvenom
    • File Transfer
    • Port Forwarding
    • Service Login and Interaction
  • Useful Commands
    • Linux Commands
    • Powershell
    • CMD
    • Python
    • Editor: Vi & Tmux
    • Metasploit
    • Powershell Empire
Powered by GitBook
On this page
  • Cheatsheet
  • Sudo Rights (sudo -l)
  • SUID (Set user ID) Binaries
  • rbash (restricted shell)
  • SSH login to bypass the loading of profile and access proper bash
  • Processes executed by Root
  • TMUX session

Was this helpful?

  1. Pentesting Cheatsheets
  2. Privilege Escalation

Linux

PreviousPrivilege EscalationNextWindows

Last updated 5 years ago

Was this helpful?

Cheatsheet

Sudo Rights (sudo -l)

SUID (Set user ID) Binaries

rbash (restricted shell)

SSH login to bypass the loading of profile and access proper bash

ssh ignite@192.168.1.103 -t "bash --noprofile"

Processes executed by Root

TMUX session

hype@Valentine:/dev/shm$ ls -la /.devs/dev_sess
srw-rw---- 1 root hype 0 Apr 27 01:12 /.devs/dev_sess

hype@Valentine:/dev/shm$ groups
hype cdrom dip plugdev sambashare

tmux -S /.devs/dev_sess 

Basic Linux Privilege Escalation - g0tmi1k
Linux Privilege Escalation using Sudo Rights - Hacking ArticlesHacking Articles
Logo
Linux Privilege Escalation using SUID Binaries - Hacking ArticlesHacking Articles
Logo
Multiple Methods to Bypass Restricted Shell - Hacking ArticlesHacking Articles
Logo
Logo