📖
Notes
Ctrlk
  • 🙌Welcome!
  • CyberSecurity
    • Penetration Testing
      • ELearnSecurity
      • PortSwigger
      • TryHackMe
        • Main Methodology
          • 1. Reconnaissance
          • 2. Enumeration/Scanning
          • 3. Gaining Access / Exploitation
          • 4. Post Exploitation
            • Privilege Escalation
              • Linux
                • 1. Introduction
                • 2. Scripts
                • 3. Kernel Exploits
                • 4. Service Exploits
                • 5. Weak File Permissions
                • 6. Sudo
                • 7. Cron jobs
                • 8. SUID/SGID Executable
                • 9. CAP_SETUID Capabilities Executable
                • 10. Passwords & Keys
                • 11. NFS
                • PrivEsc CTF Checklists
              • Windows
            • Tools
            • Windows Active Directory
          • 5. Covering Tracks
          • 6. Reporting
        • Networking Concepts
        • Scripting
        • Web Extensions
      • Miscellaneous
    • Blue Teaming
  • DevOps
    • Infrastructure as a Code (IaC)
    • Orchestration
  • Development
    • Blockchain
    • Backend
    • Database
    • Testing
Powered by GitBook
On this page
  1. CyberSecurity
  2. Penetration Testing
  3. TryHackMe
  4. Main Methodology
  5. 4. Post Exploitation
  6. Privilege Escalation
  7. Linux

PrivEsc CTF Checklists

Linux

  • https://book.hacktricks.xyz/linux-unix/linux-privilege-escalation-checklist

  • https://github.com/netbiosX/Checklists/blob/master/Linux-Privilege-Escalation.md

  • https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md

  • https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_-_linux.html

  • https://payatu.com/guide-linux-privilege-escalation


Previous11. NFSNextWindows

Last updated 2 years ago