Checklist Privesc Linux

Manual Enumeration

Automated Enumeration

Inspecting User Trails

Inspecting Service Footprints

Abusing Cron Jobs

Abusing /etc/passwd

Abusing Setuid Binaries and Capabilities

Abusing Sudo

Exploiting Kernel Vulnerabilities