Linux privilege escalation
For this recipe, we use a vulnerable OS called Stapler. The image can be downloaded from https://www.vulnhub.com/entry/stapler-1,150/ and loaded on VirtualBox. In the previous chapter, we learned how to perform a vulnerability assessment and gain low-level or high-level access. As part of the exercise, the reader can perform penetration testing and gain a shell on the Stapler OS. We be from the point where we receive a low-privilege shell.
Getting ready
For this recipe, the reader needs to have a low-privilege shell on the vulnerable Stapler OS. In this scenario, we managed to get an SSH connection to one of the users by doing some information gathering and password bruting.
How to do it...
- We have logged in to the Stapler machine with the username
SHayslett
, as shown in the following screenshot:
- We will enumerate the OS kernel version of the system. Enter the following command to check the version flavor and kernel details:
uname -a cat /etc/lsb-release...