# Linux Privilege Escalation

:warning: Content of this page has been moved to [InternalSecurityResources/redteam/persistence/linux-persistence](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/)

* [Tools](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#tools)
* [Checklist](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#checklists)
* [Looting for passwords](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#looting-for-passwords)
  * [Files containing passwords](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#files-containing-passwords)
  * [Old passwords in /etc/security/opasswd](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#old-passwords-in-etcsecurityopasswd)
  * [Last edited files](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#last-edited-files)
  * [In memory passwords](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#in-memory-passwords)
  * [Find sensitive files](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#find-sensitive-files)
* [SSH Key](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#ssh-key)
  * [Sensitive files](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#sensitive-files)
  * [SSH Key Predictable PRNG (Authorized\_Keys) Process](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#ssh-key-predictable-prng-authorized_keys-process)
* [Scheduled tasks](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#scheduled-tasks)
  * [Cron jobs](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#cron-jobs)
  * [Systemd timers](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#systemd-timers)
* [SUID](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#suid)
  * [Find SUID binaries](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#find-suid-binaries)
  * [Create a SUID binary](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#create-a-suid-binary)
* [Capabilities](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#capabilities)
  * [List capabilities of binaries](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#list-capabilities-of-binaries)
  * [Edit capabilities](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#edit-capabilities)
  * [Interesting capabilities](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#interesting-capabilities)
* [SUDO](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#sudo)
  * [NOPASSWD](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#nopasswd)
  * [LD\_PRELOAD and NOPASSWD](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#ld_preload-and-nopasswd)
  * [Doas](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#doas)
  * [sudo\_inject](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#sudo_inject)
  * [CVE-2019-14287](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#cve-2019-14287)
* [GTFOBins](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#gtfobins)
* [Wildcard](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#wildcard)
* [Writable files](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#writable-files)
  * [Writable /etc/passwd](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#writable-etcpasswd)
  * [Writable /etc/sudoers](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#writable-etcsudoers)
* [NFS Root Squashing](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#nfs-root-squashing)
* [Shared Library](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#shared-library)
  * [ldconfig](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#ldconfig)
  * [RPATH](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#rpath)
* [Groups](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#groups)
  * [Docker](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#docker)
  * [LXC/LXD](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#lxclxd)
* [Hijack TMUX session](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#hijack-tmux-session)
* [Kernel Exploits](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#kernel-exploits)
  * [CVE-2022-0847 (DirtyPipe)](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#cve-2022-0847-dirtypipe)
  * [CVE-2016-5195 (DirtyCow)](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#cve-2016-5195-dirtycow)
  * [CVE-2010-3904 (RDS)](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#cve-2010-3904-rds)
  * [CVE-2010-4258 (Full Nelson)](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#cve-2010-4258-full-nelson)
  * [CVE-2012-0056 (Mempodipper)](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/redteam/escalation/linux-privilege-escalation/#cve-2012-0056-mempodipper)
