00 — Overview
Linux Privilege Escalation
You have a low-privileged shell — now what? Learn how SUID binaries, sudo misconfigurations, writable cron jobs, and world-writable paths let attackers become root.
Intermediate·55 min·5 tasks
// By the end of this module
→Systematically enumerate a Linux system for escalation paths
→Exploit SUID binaries, sudo misconfigurations, and writable cron jobs
→Use GTFOBins to find escalation paths for common binaries
→Escalate from a low-privilege shell to root
// Prerequisites
Complete these before starting this module for the best experience.