Enumeration techniques for privilege escalation
Enumeration is a key phase in privilege escalation, allowing pentesters to gather information about the target system. This section focuses on Bash commands and techniques for effective system enumeration for privilege escalation.
Initial access
This section will precede privilege escalation. It covers connecting to the ESCALATE_LINUX
virtual machine, which we’ll call the target for the remainder of this chapter. Once we have established a working shell, we’ll move forward into subsequent sections.
In this exercise, I have both the Kali and the target running in VirtualBox virtual machines. Both Kali and ESCALATE_LINUX
offer virtual machine OVA files that can be downloaded and imported into VirtualBox.
The network interfaces are configured to use the host-only network adapter, as shown in the following figure:
Figure 11.1 – The virtual network interface configuration
The Kali...