00 — Overview

Linux Privilege Escalation

You have a low-privileged shell — now what? Learn how SUID binaries, sudo misconfigurations, writable cron jobs, and world-writable paths let attackers become root.

Intermediate·55 min·5 tasks
// By the end of this module
Systematically enumerate a Linux system for escalation paths
Exploit SUID binaries, sudo misconfigurations, and writable cron jobs
Use GTFOBins to find escalation paths for common binaries
Escalate from a low-privilege shell to root
// Prerequisites
Complete these before starting this module for the best experience.