How to Get Root Privilege after getting foothold [ EJPT Notes]
1 min read
Summary
The article discusses privilege escalation, a technique used by red teamers to obtain root privilege on a target machine after gaining initial access.
It explains that privilege escalation can be applied to both Windows and Linux systems, but the example in the article focuses on Linux privilege escalation using the SUID method via Nmap.
The hacker gains foothold on the machine and wants to acquire root access for full privileges.
Using the SUID method, the hacker can exploit vulnerabilities in SUID files to elevate their privileges.
The article provides a step-by-step process of how this can be achieved, including finding potentially vulnerable SUID files using Nmap, exploiting the found SUID vulnerability, and using root sensu scripts to obtain root access.
The article aims to help individuals preparing for the EJPT exam, which involves learning practical aspects of ethical hacking and penetration testing.
It highlights the importance of understanding privilege escalation techniques in order to gain higher levels of access on a target machine.