In this recipe, we will look at ways in which we can gain access to a root account on a comprised box. The key to successful escalation is by gathering as much as information possible about the system.
Vertical escalation
How to do it...
- The first step of rooting any box would be to check whether there are any publicly available local root exploits.
- We can use scripts such as Linux Exploit Suggester for this. It is a script that's built in Perl. We can specify the kernel version and it will show us the possible publicly available exploits we can use to gain root privileges.
- The script can be downloaded by using the following command:
git clone https://github.com/PenturaLabs/Linux_Exploit_Suggester.git
We can see the...