2024-07-18 22:16:31 +00:00
# Checklist - Linux Privilege Escalation
2022-04-28 16:01:33 +00:00
2024-07-18 22:16:31 +00:00
{% hint style="success" %}
Leer & oefen AWS Hacking:< img src = "/.gitbook/assets/arte.png" alt = "" data-size = "line" > [**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)< img src = "/.gitbook/assets/arte.png" alt = "" data-size = "line" > \
Leer & oefen GCP Hacking: < img src = "/.gitbook/assets/grte.png" alt = "" data-size = "line" > [**HackTricks Training GCP Red Team Expert (GRTE)**< img src = "/.gitbook/assets/grte.png" alt = "" data-size = "line" > ](https://training.hacktricks.xyz/courses/grte)
2022-04-28 16:01:33 +00:00
2024-07-18 22:16:31 +00:00
< details >
2022-04-28 16:01:33 +00:00
2024-07-18 22:16:31 +00:00
< summary > Ondersteun HackTricks< / summary >
2024-01-05 11:06:33 +00:00
2024-07-18 22:16:31 +00:00
* Kyk na die [**subskripsie planne** ](https://github.com/sponsors/carlospolop )!
* **Sluit aan by die** 💬 [**Discord groep** ](https://discord.gg/hRep4RUj7f ) of die [**telegram groep** ](https://t.me/peass ) of **volg** ons op **Twitter** 🐦 [**@hacktricks\_live** ](https://twitter.com/hacktricks\_live )**.**
* **Deel hacking truuks deur PRs in te dien na die** [**HackTricks** ](https://github.com/carlospolop/hacktricks ) en [**HackTricks Cloud** ](https://github.com/carlospolop/hacktricks-cloud ) github repos.
2022-04-28 16:01:33 +00:00
2022-10-27 23:22:18 +00:00
< / details >
2024-07-18 22:16:31 +00:00
{% endhint %}
2022-04-28 16:01:33 +00:00
2024-11-19 12:35:12 +00:00
< figure > < img src = "/.gitbook/assets/image.png" alt = "" > < figcaption > < / figcaption > < / figure >
2023-02-27 09:28:45 +00:00
2024-11-19 12:35:12 +00:00
Sluit aan by [**HackenProof Discord** ](https://discord.com/invite/N3FrSbmwdy ) bediener om te kommunikeer met ervare hackers en bug bounty jagters!
2023-02-27 09:28:45 +00:00
2024-07-18 22:16:31 +00:00
**Hacking Inligting**\
Betrek met inhoud wat die opwinding en uitdagings van hacking ondersoek
2023-07-14 14:20:34 +00:00
2024-11-19 12:35:12 +00:00
**Regte-Tyd Hack Nuus**\
Bly op hoogte van die vinnige hacking wêreld deur regte-tyd nuus en insigte
2023-07-14 14:20:34 +00:00
2024-07-18 22:16:31 +00:00
**Laaste Aankondigings**\
Bly ingelig oor die nuutste bug bounties wat bekendgestel word en belangrike platform opdaterings
2023-07-14 14:20:34 +00:00
2024-11-19 12:35:12 +00:00
**Sluit aan by ons op** [**Discord** ](https://discord.com/invite/N3FrSbmwdy ) en begin vandag saamwerk met top hackers!
2022-04-28 16:01:33 +00:00
2024-07-18 22:16:31 +00:00
### **Beste hulpmiddel om na Linux plaaslike privilige eskalasie vektore te soek:** [**LinPEAS**](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS)
2022-04-28 16:01:33 +00:00
2024-02-11 02:07:06 +00:00
### [Stelselinligting](privilege-escalation/#system-information)
2020-07-15 15:43:14 +00:00
2024-07-18 22:16:31 +00:00
* [ ] Kry **OS inligting**
* [ ] Kyk na die [**PATH** ](privilege-escalation/#path ), enige **skryfbare vouer** ?
* [ ] Kyk [**omgewing veranderlikes** ](privilege-escalation/#env-info ), enige sensitiewe besonderhede?
* [ ] Soek na [**kernel exploits** ](privilege-escalation/#kernel-exploits ) **met behulp van skripte** (DirtyCow?)
* [ ] **Kyk** of die [**sudo weergawe** kwesbaar is ](privilege-escalation/#sudo-version )
* [ ] [**Dmesg** handtekening verifikasie het misluk ](privilege-escalation/#dmesg-signature-verification-failed )
2024-11-19 12:35:12 +00:00
* [ ] Meer stelselinventaris ([datum, stelsels stats, cpu inligting, drukkers](privilege-escalation/#more-system-enumeration))
2024-07-18 22:16:31 +00:00
* [ ] [**Enumereer meer verdediging** ](privilege-escalation/#enumerate-possible-defenses )
2020-07-15 15:43:14 +00:00
2024-07-18 22:16:31 +00:00
### [Aandrywe](privilege-escalation/#drives)
2020-08-24 16:38:31 +00:00
2024-07-18 22:16:31 +00:00
* [ ] **Lys gemonteerde** aandrywe
* [ ] **Enige ongemonteerde aandrywe?**
* [ ] **Enige krediete in fstab?**
2020-08-24 16:38:31 +00:00
2024-07-18 22:16:31 +00:00
### [**Gemonteerde Sagteware**](privilege-escalation/#installed-software)
2020-08-24 16:41:51 +00:00
2024-07-18 22:16:31 +00:00
* [ ] **Kyk vir** [ **nuttige sagteware** ](privilege-escalation/#useful-software ) **geïnstalleer**
* [ ] **Kyk vir** [**kwesbare sagteware** ](privilege-escalation/#vulnerable-software-installed ) **geïnstalleer**
2020-08-24 16:41:51 +00:00
2024-02-11 02:07:06 +00:00
### [Prosesse](privilege-escalation/#processes)
2020-07-15 15:43:14 +00:00
2024-07-18 22:16:31 +00:00
* [ ] Is enige **onbekende sagteware aan die gang** ?
* [ ] Is enige sagteware aan die gang met **meer privilige as wat dit behoort te hê** ?
* [ ] Soek na **exploits van lopende prosesse** (veral die weergawe wat aan die gang is).
* [ ] Kan jy die **binaire** van enige lopende proses **wysig** ?
* [ ] **Monitor prosesse** en kyk of enige interessante proses gereeld aan die gang is.
2024-11-19 12:35:12 +00:00
* [ ] Kan jy **lees** van sommige interessante **prosesgeheue** (waar wagwoorde gestoor kan word)?
2020-07-15 15:43:14 +00:00
2024-07-18 22:16:31 +00:00
### [Geskeduleerde/Cron werke?](privilege-escalation/#scheduled-jobs)
2020-07-15 15:43:14 +00:00
2024-07-18 22:16:31 +00:00
* [ ] Word die [**PATH** ](privilege-escalation/#cron-path ) deur 'n cron gewysig en kan jy daarin **skryf** ?
* [ ] Enige [**wildcard** ](privilege-escalation/#cron-using-a-script-with-a-wildcard-wildcard-injection ) in 'n cron werk?
* [ ] Sommige [**wysigbare skrip** ](privilege-escalation/#cron-script-overwriting-and-symlink ) word **uitgevoer** of is binne **wysigbare vouer** ?
2024-11-19 12:35:12 +00:00
* [ ] Het jy opgemerk dat sommige **skrip** of word [**gereeld uitgevoer** ](privilege-escalation/#frequent-cron-jobs )? (elke 1, 2 of 5 minute)
2020-08-24 16:56:30 +00:00
2024-02-11 02:07:06 +00:00
### [Dienste](privilege-escalation/#services)
2020-08-24 16:56:30 +00:00
2024-07-18 22:16:31 +00:00
* [ ] Enige **skryfbare .service** lêer?
* [ ] Enige **skryfbare binaire** wat deur 'n **diens** uitgevoer word?
* [ ] Enige **skryfbare vouer in systemd PATH** ?
2020-08-24 16:56:30 +00:00
2024-07-18 22:16:31 +00:00
### [Timers](privilege-escalation/#timers)
2020-08-24 16:56:30 +00:00
2024-07-18 22:16:31 +00:00
* [ ] Enige **skryfbare timer** ?
2020-08-24 16:56:30 +00:00
2022-05-01 13:25:53 +00:00
### [Sockets](privilege-escalation/#sockets)
2020-07-15 15:43:14 +00:00
2024-04-07 05:33:57 +00:00
* [ ] Enige **skryfbare .socket** lêer?
2024-07-18 22:16:31 +00:00
* [ ] Kan jy **kommunikeer met enige socket** ?
* [ ] **HTTP sockets** met interessante inligting?
2020-07-15 15:43:14 +00:00
2022-05-01 13:25:53 +00:00
### [D-Bus](privilege-escalation/#d-bus)
2020-08-24 16:56:30 +00:00
2024-07-18 22:16:31 +00:00
* [ ] Kan jy **kommunikeer met enige D-Bus** ?
2020-08-24 16:56:30 +00:00
2024-02-11 02:07:06 +00:00
### [Netwerk](privilege-escalation/#network)
2020-07-15 15:43:14 +00:00
2024-02-11 02:07:06 +00:00
* [ ] Enumereer die netwerk om te weet waar jy is
2024-11-19 12:35:12 +00:00
* [ ] **Oop poorte wat jy voorheen nie kon toegang nie** om 'n shell binne die masjien te kry?
2024-07-18 22:16:31 +00:00
* [ ] Kan jy **verkeer afluister** met `tcpdump` ?
2020-07-15 15:43:14 +00:00
2024-02-11 02:07:06 +00:00
### [Gebruikers](privilege-escalation/#users)
2020-07-15 15:43:14 +00:00
2024-07-18 22:16:31 +00:00
* [ ] Generiese gebruikers/groepe **enumering**
2024-02-11 02:07:06 +00:00
* [ ] Het jy 'n **baie groot UID** ? Is die **masjien** **kwesbaar** ?
2024-07-18 22:16:31 +00:00
* [ ] Kan jy [**privilege eskalasie danksy 'n groep** ](privilege-escalation/interesting-groups-linux-pe/ ) waartoe jy behoort?
* [ ] **Clipboard** data?
2024-02-11 02:07:06 +00:00
* [ ] Wagwoordbeleid?
2024-07-18 22:16:31 +00:00
* [ ] Probeer om **elke bekende wagwoord** wat jy voorheen ontdek het te gebruik om in te log met **elke** moontlike **gebruiker** . Probeer ook om sonder 'n wagwoord in te log.
2020-07-15 15:43:14 +00:00
2024-07-18 22:16:31 +00:00
### [Skryfbare PATH](privilege-escalation/#writable-path-abuses)
2020-07-15 15:43:14 +00:00
2024-07-18 22:16:31 +00:00
* [ ] As jy **skryfregte oor 'n vouer in PATH** het, kan jy dalk privilige eskalasie doen
2024-04-07 05:33:57 +00:00
2024-07-18 22:16:31 +00:00
### [SUDO en SUID opdragte](privilege-escalation/#sudo-and-suid)
2024-04-07 05:33:57 +00:00
2024-07-18 22:16:31 +00:00
* [ ] Kan jy **enige opdrag met sudo uitvoer** ? Kan jy dit gebruik om IES, SKRYF of UITVOER enigiets as root? ([**GTFOBins**](https://gtfobins.github.io))
* [ ] Is enige **exploitable SUID binaire** ? ([**GTFOBins**](https://gtfobins.github.io))
* [ ] Is [**sudo** opdragte **beperk** deur **pad**? kan jy die beperkings **omseil** ](privilege-escalation/#sudo-execution-bypassing-paths )?
* [ ] [**Sudo/SUID binaire sonder pad aangedui** ](privilege-escalation/#sudo-command-suid-binary-without-command-path )?
* [ ] [**SUID binaire wat pad spesifiseer** ](privilege-escalation/#suid-binary-with-command-path )? Omseil
2024-04-07 05:33:57 +00:00
* [ ] [**LD\_PRELOAD kwesbaarheid** ](privilege-escalation/#ld\_preload )
2024-07-18 22:16:31 +00:00
* [ ] [**Gebrek aan .so biblioteek in SUID binaire** ](privilege-escalation/#suid-binary-so-injection ) van 'n skryfbare vouer?
* [ ] [**SUDO tokens beskikbaar** ](privilege-escalation/#reusing-sudo-tokens )? [**Kan jy 'n SUDO token skep** ](privilege-escalation/#var-run-sudo-ts-less-than-username-greater-than )?
2024-11-19 12:35:12 +00:00
* [ ] Kan jy [**sudoers lêers lees of wysig** ](privilege-escalation/#etc-sudoers-etc-sudoers-d )?
* [ ] Kan jy [**/etc/ld.so.conf.d/** ](privilege-escalation/#etc-ld-so-conf-d ) wysig?
2024-05-05 22:31:04 +00:00
* [ ] [**OpenBSD DOAS** ](privilege-escalation/#doas ) opdrag
2024-07-18 22:16:31 +00:00
2024-11-19 12:35:12 +00:00
### [Vermoeë](privilege-escalation/#capabilities)
2020-07-15 15:43:14 +00:00
2024-07-18 22:16:31 +00:00
* [ ] Het enige binaire enige **onverwagte vermoë** ?
2020-07-15 15:43:14 +00:00
2024-07-18 22:16:31 +00:00
### [ACLs](privilege-escalation/#acls)
2020-07-15 15:43:14 +00:00
2024-02-11 02:07:06 +00:00
* [ ] Het enige lêer enige **onverwagte ACL** ?
2020-07-15 15:43:14 +00:00
2024-07-18 22:16:31 +00:00
### [Oop Shell sessies](privilege-escalation/#open-shell-sessions)
2020-07-15 15:43:14 +00:00
2022-02-23 22:01:26 +00:00
* [ ] **screen**
* [ ] **tmux**
2020-07-15 15:43:14 +00:00
2022-05-01 13:25:53 +00:00
### [SSH](privilege-escalation/#ssh)
2020-07-15 15:43:14 +00:00
2024-02-11 02:07:06 +00:00
* [ ] **Debian** [**OpenSSL Voorspelbare PRNG - CVE-2008-0166** ](privilege-escalation/#debian-openssl-predictable-prng-cve-2008-0166 )
* [ ] [**SSH Interessante konfigurasiewaardes** ](privilege-escalation/#ssh-interesting-configuration-values )
2020-07-15 15:43:14 +00:00
2024-02-11 02:07:06 +00:00
### [Interessante Lêers](privilege-escalation/#interesting-files)
2020-07-15 15:43:14 +00:00
2024-07-18 22:16:31 +00:00
* [ ] **Profiel lêers** - Lees sensitiewe data? Skryf na privesk?
* [ ] **passwd/shadow lêers** - Lees sensitiewe data? Skryf na privesk?
* [ ] **Kyk na algemeen interessante vouers** vir sensitiewe data
* [ ] **Vreemde Ligging/Eienaars lêers,** jy mag toegang hê tot of uitvoerbare lêers verander
2024-04-07 05:33:57 +00:00
* [ ] **Gewysig** in laaste minute
2024-02-11 02:07:06 +00:00
* [ ] **Sqlite DB lêers**
* [ ] **Versteekte lêers**
2024-07-18 22:16:31 +00:00
* [ ] **Skrip/Binaries in PATH**
2024-02-11 02:07:06 +00:00
* [ ] **Web lêers** (wagwoorde?)
2024-07-18 22:16:31 +00:00
* [ ] **Backups** ?
2024-02-11 02:07:06 +00:00
* [ ] **Bekende lêers wat wagwoorde bevat** : Gebruik **Linpeas** en **LaZagne**
* [ ] **Generiese soektog**
2020-07-15 15:43:14 +00:00
2024-02-11 02:07:06 +00:00
### [**Skryfbare Lêers**](privilege-escalation/#writable-files)
2020-07-15 15:43:14 +00:00
2024-07-18 22:16:31 +00:00
* [ ] **Wysig python biblioteek** om arbitrêre opdragte uit te voer?
* [ ] Kan jy **log lêers wysig** ? **Logtotten** kwesbaarheid
2024-11-19 12:35:12 +00:00
* [ ] Kan jy ** /etc/sysconfig/network-scripts/** wysig? Centos/Redhat kwesbaarheid
2024-04-07 05:33:57 +00:00
* [ ] Kan jy [**skryf in ini, int.d, systemd of rc.d lêers** ](privilege-escalation/#init-init-d-systemd-and-rc-d )?
2020-07-15 15:43:14 +00:00
2024-02-11 02:07:06 +00:00
### [**Ander truuks**](privilege-escalation/#other-tricks)
2020-07-15 15:43:14 +00:00
2024-07-18 22:16:31 +00:00
* [ ] Kan jy [**NFS misbruik om privilige te eskaleer** ](privilege-escalation/#nfs-privilege-escalation )?
* [ ] Moet jy [**ontsnap uit 'n beperkende shell** ](privilege-escalation/#escaping-from-restricted-shells )?
2024-11-19 12:35:12 +00:00
< figure > < img src = "/.gitbook/assets/image.png" alt = "" > < figcaption > < / figcaption > < / figure >
2024-07-18 22:16:31 +00:00
2024-11-19 12:35:12 +00:00
Sluit aan by [**HackenProof Discord** ](https://discord.com/invite/N3FrSbmwdy ) bediener om te kommunikeer met ervare hackers en bug bounty jagters!
2024-07-18 22:16:31 +00:00
**Hacking Inligting**\
Betrek met inhoud wat die opwinding en uitdagings van hacking ondersoek
2024-11-19 12:35:12 +00:00
**Regte-Tyd Hack Nuus**\
Bly op hoogte van die vinnige hacking wêreld deur regte-tyd nuus en insigte
2024-07-18 22:16:31 +00:00
**Laaste Aankondigings**\
Bly ingelig oor die nuutste bug bounties wat bekendgestel word en belangrike platform opdaterings
2024-11-19 12:35:12 +00:00
**Sluit aan by ons op** [**Discord** ](https://discord.com/invite/N3FrSbmwdy ) en begin vandag saamwerk met top hackers!
2024-07-18 22:16:31 +00:00
{% hint style="success" %}
Leer & oefen AWS Hacking:< img src = "/.gitbook/assets/arte.png" alt = "" data-size = "line" > [**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)< img src = "/.gitbook/assets/arte.png" alt = "" data-size = "line" > \
Leer & oefen GCP Hacking: < img src = "/.gitbook/assets/grte.png" alt = "" data-size = "line" > [**HackTricks Training GCP Red Team Expert (GRTE)**< img src = "/.gitbook/assets/grte.png" alt = "" data-size = "line" > ](https://training.hacktricks.xyz/courses/grte)
< details >
< summary > Ondersteun HackTricks< / summary >
* Kyk na die [**subskripsie planne** ](https://github.com/sponsors/carlospolop )!
* **Sluit aan by die** 💬 [**Discord groep** ](https://discord.gg/hRep4RUj7f ) of die [**telegram groep** ](https://t.me/peass ) of **volg** ons op **Twitter** 🐦 [**@hacktricks\_live** ](https://twitter.com/hacktricks\_live )**.**
* **Deel hacking truuks deur PRs in te dien na die** [**HackTricks** ](https://github.com/carlospolop/hacktricks ) en [**HackTricks Cloud** ](https://github.com/carlospolop/hacktricks-cloud ) github repos.
< / details >
{% endhint %}