Privilege escalation
After exploitation - interesting cmd's
#check user privs
sudo -l
# Check installed FTP version
apt list --installed | grep ftp
# Check for locally open ports
netstat -antp | grep -i list
# Get SSH version on Linux
ssh -v localhost
# Get FTP daemon package version on Linux
dpkg -l pure-ftpd
# View OS related info
uname -a
lsb_release -aPrivilege Escalation — CVE-2024–48990 / CVE-2024–48991 (needrestart)
Linpeass
Transfer Linpeas to the victims machine
Execute from memory and send output back to the host
CVE-2021-3493 - Ubuntu kernel priv escalation
Affected versions
Shadow File
DirtyCowl - 2016-5195
Check all executables that we can execute as sudo:
Check the sudo privileges we might have as current user:
Check the crontabs
Last updated
