Privilege Escalation
Steps
Reconnaissance
Check SUDO permissions
With the following command, you can check what actions the current user can do as sudo, which is useful to know to escalate privileges.
sudo -l # https://www.man7.org/linux/man-pages/man8/sudo.8.htmlLook for SETUID
Files with the setuid bit set are executed with the permissions of the owner of the file, not the user who started the program. This can be used to escalate privileges.
You can use the following command to find all files/executables with the setuid bit set.
find / -perm -u=s -type f 2>/dev/nullExploitation
SETUID binaries
This website collects legitimate functions of Unix-like executables that can be abused to break out of restricted shells, escalate or maintain elevated privileges, transfer files, spawn bind and reverse shells, and facilitate other post-exploitation tasks.
If it is a custom program or executable, you can refer to the Binary Exploitation section of my notes.
For Windows systems, you can use the LOLBAS website as a reference.