Linux
Take your time. Don't try to do too much at once. Remember small steps - don't try to jump to root using rshell. Maybe run a few commands to see what they do
Once you've found the patch to escalation click here:
https://github.com/Ignitetechnologies/Privilege-Escalation


Post exploitation
ShellsLinux Privilege Escalation Examples
MindMap

Useful commands to run
Things to look for
SUDO
Can you su to root without a password?
Spawning root shells
Questions to ask yourself
What user with what permissions + where am I?
What usernames could I login as?
What architecture?
Whats running on the machine?
What files does the user have permission?
What services are running?
What is installed?
Run on target
What kernel version - low hanging fruit?
What web app creds can i find?
Can you see the shadow file - get lucky?
Some programs that can be used to spawn a shell:
Docker
Cron Jobs
What jobs are scheduled?
Confidential information and users
Find interesting files and directories fast
File Write
If you have found a download it to your box and open it in Ghidra. Check the main function to view de-compiled commands interesting binary SUID files / binaries

Capabilities
World-writable folders
World-executable folders
World-writeable & executable folders
gives a bit more info
Word writable directories for root
Look for binaries with the SUID or GUID bits set.
/etc/shadow overwrite
Check running services and installed applications
Architecture
Environment variables
Find apps installed;
Find writable configuration files
Miss-configured services
Scheduled jobs
Grep hardcoded passwords
if web server run in web root:
Network configuration
Mounted filesystems
Generating SUID C Shell for /bin/bash
World readable/writable files:
Inspect web traffic
Scripts to run
Copy them over
SUID search - good tool
Automatically downloads and compiles exploit
Linux Remote Exploits
Kernelpop

Linux Local Exploits
Linux Kernel Exploits

Unix Priv checker
LinEnum
LinuxPrivchecker.py
Exploits worth running
Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation
CVE-2010-3904 - Linux RDS Exploit - Linux Kernel <= 2.6.36-rc8
Linux Kernel <= 2.6.37 'Full-Nelson.c'
CVE-2012-0056 - Mempodipper - Linux Kernel 2.6.39 < 3.2.2 (Gentoo / Ubuntu x86/x64)
Linux CVE 2012-0056
CVE-2016-5195 - Dirty Cow - Linux Privilege Escalation - Linux Kernel <= 3.19.0-73.8
Compile dirty cow:
Cross compiling exploits
Linux 2.6.32
Elevation in 2.6.x:
Get proof
Last updated