Linux Privilege Escalation Techniques
Kernel Exploits
Programs or Services running as root - could allow you to execute a command
Scripts running as root user - maybe they’re writeable
Vulnerable installed software
Weak/reused/plaintext passwords
SUID/SGID misconfiguration
Abusing sudo rights
World writeable scripts invoked by root
Bad path configuration
cronjobs
unmounted filesystems
What are the 5 steps of incident response?