HACKING
MenuWriteupsMy ProjectsAbout me
  • 👾Ethical Hacking
  • 🔑Cracking - Hashing
  • Operating Systems
    • 🐧Linux
  • Reconnaissance
    • 🌐Network Scanning
  • Post-Exploitation
    • ⬆️Privilege Escalation
    • 🛠️Privilege Escalation Tools
      • ♠️LinPEAS
      • ♥️Pspy64
      • ♣️Linux Smarter Enumeration
      • #️⃣GTFObins
  • ☠️Vulnerabilities
    • 💥Software Vulnerabilities
      • Bash
      • C
    • Linux Vulns
  • Practice
    • 📖Writeups
      • HackMyVM
        • Easy 🟢
          • Gift
          • Helium
          • Hidden
          • Ripper
          • Beloved
          • Noob
          • Hundred
          • Bah
          • Doc
          • Warez
          • Doubletrouble
          • Stars
          • Method
  • About me
    • 📚My projects
    • 👤About me
Powered by GitBook
On this page
  • SUID, SGID and Capabilities
  • Running processes
  • Utilities
  1. Post-Exploitation

Privilege Escalation

SUID, SGID and Capabilities

Commands to view SUID binaries:

find / -type f -perm -4000 -ls 2>/dev/null

Commands to view SGID binaries:

find / -type f -perm -g+s 2>/dev/null

Commands to view capabilities:

getcap -r / 2>/dev/null
/usr/sbin/getcap -r / 2>/dev/null

Running processes

Display a complete and extended list of all running processes on the system:

ps -faux

Show a list of listening TCP sockets on the system, including the IP address and listening port number, as well as the associated program (process) waiting for connections on each socket:

ss -nltp

Tasks that run at specified intervals:

cat /etc/crontab

Utilities

Check for directories or files where we have write permissions:

find / -writable | grep -v -E "proc|dev"

Last updated 1 year ago

⬆️