In my previous writeups, we learned some Linux commands, Linux files system, file permissions, tools, and services. We also exploited a vulnerable Linux machineusing different techniques that involved privilege escalation.

Common Linux Privilege escalation

In this walkthrough, we are going to deep dive into some of the common Linux Privilege escalation and techniques that will come handy during a penetration test or while playing a CTF (Capture The Flag )Challenge.

Prerequisites

Although the room has a detailed explanation of each topic, beforehand knowledge will let you understand the concepts more easily and clearly

  1. Understanding of SSH, listing, copying, and writing of files
  2. Basic Understanding of Linux Files System, file permissions, etc

#writeup #linux #tryhackme #filesystem #privilege-escalation

Write-Up 11- Common Linux Privilege Escalation
2.50 GEEK