Summary
In this chapter, we started by looking at how filesystem permissions work on Linux and how SUID permissions are used. We then took an in-depth look at how to search for and identify SUID binaries on the target system, both manually and automatically. We also briefly explored the process of identifying vulnerable SUID binaries, before looking at how to elevate our privileges by exploiting misconfigured SUID binaries.
If you have made it this far, congratulations! You should now be well-versed in elevating your privileges on both Windows and Linux by leveraging and exploiting various vulnerabilities on both operating systems.
If this was your initial foray into the process of privilege escalation, you should now have the necessary skills to identify and exploit vulnerabilities on target systems to elevate your privileges.
This book was designed to be a practical guide on how to enumerate as much information as possible from Windows and Linux targets, as well as how...