Lab 16: Linux Privilege Escalation
Objective
Background
Architecture
Time
Lab Instructions
Step 1: Setup — Create Vulnerable Environment
Step 2: Reconnaissance as lowuser
Step 3: Technique 1 — SUID Python3 → Root Shell
Step 4: Technique 2 — Sudo Misconfiguration (find)
Step 5: Technique 3 — Writable Cron Script
Step 6: Technique 4 — World-Writable /etc/passwd
Steps 7–8: Full Privesc Checklist + Remediation
Further Reading
PreviousLab 15: Capstone — Multi-Vulnerability Attack ChainNextLab 17: Lateral Movement & Persistence
Last updated
