Hacking Articles Privilege Escalation
Linux Privilege Escalation Techniques Hacking Dream Repeat same procedure to escalate the privilege, take the access of host machine as a local user and move ahead for privilege escalation. since this time admin has use cap_dac_read_search that will help us to bypass file read permission checks and directory read and execute permission checks. getcap -r / 2>/dev/null pwd ls -al tar 1. Vertical privilege escalation is potentially more dangerous. it is also known as privilege elevation. in this, the attackers begin with a fewer privileges account to obtain the rights of a more compelling user, most probably the administrator or the system user on microsoft windows, or root on unix and linux system. Privilege escalation through lxd requires the access of local account, therefore, we choose ssh to connect and take the access local account on host machine. note: the most important condition is that the user should be a member of lxd group. ssh raj@192. 168. 1. 105 1. Lxd privilege escal...