Post exploitation/Privilege escalation

1

User privileges

id, sudo, etc.

2

SUID/SGID bit

3

File permissions

4

Environment variables

5

Cronjobs

6

Kernel exploit

7

Automated tools

winpeas, linpeas, etc.

Last updated