Linux Privilege Escalation

Room Link: https://tryhackme.com/room/linprivescarrow-up-right

Enumeration

What is the hostname of the target system?

Victim

hostname

What is the Linux kernel version of the target system?

Victim

What Linux is this?

Victim

What version of the Python language is installed on the system?

Victim

What vulnerability seem to affect the kernel of the target system? (Enter a CVE number)

CVE-2015-1328

Privilege Escalation: Kernel Exploits

Victim

Kali

Victim

Privilege Escalation: Sudo

How many programs can the user "karen" run on the target system with sudo rights?

Victim

What is the content of the flag2.txt file?

Victim

How would you use Nmap to spawn a root shell if your user had sudo rights on nmap?

Victim

What is the hash of frank's password?

Victim

Privilege Escalation: SUID

Victim

Which user shares the name of a great comic book writer?

Victim

What is the password of user2?

Since base64 was in the list we can read the contents of shadow and passwd with it. Once outputted save the results on Kali.

Victim

Kali

What is the content of the flag3.txt file?

Victim

Privilege Escalation: Capabilities

How many binaries have set capabilities?

Victim

What is the content of the flag4.txt file?

Victim

Victim

Privilege Escalation: Cron Jobs

How many user-defined cron jobs can you see on the target system?

Victim

Victim

Kali

Victim

What is Matt's password?

Cat files and copy over to Kali.

Victim

Kali

Privilege Escalation: PATH

What is the odd folder you have write access for?

Victim

Exploit the $PATH vulnerability to read the content of the flag6.txt file

Victim

Privilege Escalation: NFS

Victim

Kali

nfc.c

Kali

Victim

Capstone Challenge

Victim

Kali

Victim

Victim

Last updated