Linux Privilege Escalation
Room Link: https://tryhackme.com/room/linprivesc
Enumeration
What is the hostname of the target system?
Victim
hostname
What is the Linux kernel version of the target system?
Victim

What Linux is this?
Victim

What version of the Python language is installed on the system?
Victim

What vulnerability seem to affect the kernel of the target system? (Enter a CVE number)
CVE-2015-1328
Privilege Escalation: Kernel Exploits
Victim

Kali
Victim

Privilege Escalation: Sudo
How many programs can the user "karen" run on the target system with sudo rights?
Victim

What is the content of the flag2.txt file?
Victim

How would you use Nmap to spawn a root shell if your user had sudo rights on nmap?
Victim
What is the hash of frank's password?
Victim
Privilege Escalation: SUID
Victim

Which user shares the name of a great comic book writer?
Victim

What is the password of user2?
Since base64 was in the list we can read the contents of shadow and passwd with it. Once outputted save the results on Kali.
Victim

Kali

What is the content of the flag3.txt file?
Victim

Privilege Escalation: Capabilities
How many binaries have set capabilities?
Victim

What is the content of the flag4.txt file?

Victim

Victim
Privilege Escalation: Cron Jobs
How many user-defined cron jobs can you see on the target system?
Victim

Victim

Kali
Victim

What is Matt's password?
Cat files and copy over to Kali.
Victim
Kali

Privilege Escalation: PATH
What is the odd folder you have write access for?
Victim

Exploit the $PATH vulnerability to read the content of the flag6.txt file


Victim
Privilege Escalation: NFS
Victim


Kali
nfc.c
Kali
Victim

Capstone Challenge
Victim
Kali

Victim
Victim

Last updated