Book Image

Privilege Escalation Techniques

By : Alexis Ahmed
5 (2)
Book Image

Privilege Escalation Techniques

5 (2)
By: Alexis Ahmed

Overview of this book

Privilege Escalation Techniques is a detailed guide to privilege escalation techniques and tools for both Windows and Linux systems. This is a one-of-a-kind resource that will deepen your understanding of both platforms and provide detailed, easy-to-follow instructions for your first foray into privilege escalation. The book uses virtual environments that you can download to test and run tools and techniques. After a refresher on gaining access and surveying systems, each chapter will feature an exploitation challenge in the form of pre-built virtual machines (VMs). As you progress, you will learn how to enumerate and exploit a target Linux or Windows system. You’ll then get a demonstration on how you can escalate your privileges to the highest level. By the end of this book, you will have gained all the knowledge and skills you need to be able to perform local kernel exploits, escalate privileges through vulnerabilities in services, maintain persistence, and enumerate information from the target such as passwords and password hashes.
Table of Contents (18 chapters)
1
Section 1: Gaining Access and Local Enumeration
6
Section 2: Windows Privilege Escalation
12
Section 3: Linux Privilege Escalation

Chapter 10: Linux Kernel Exploits

Now that you have a functional understanding of how to elevate your privileges on Windows systems, we can begin exploring the process of elevating our privileges on Linux systems. The first privilege escalation attack vector we will be exploring in this chapter is kernel exploitation.

In this chapter, you will learn how to identify, transfer, and utilize kernel exploits on Linux both manually and automatically. This process will mirror the same methodology we used in Chapter 5, Windows Kernel Exploits, where we explored the kernel exploitation process on Windows.

We will start by taking a look at how the Linux kernel works and how to identify kernel vulnerabilities on Linux by using local enumeration scripts. After this, we will explore the process of modifying, compiling, and transferring kernel exploits to the target system.

In this chapter, we're going to cover the following main topics:

  • Understanding the Linux kernel
  • Kernel...