Summary
This chapter was dedicated to exploring the techniques and strategies for achieving privilege escalation through the Bash shell in pentesting scenarios. It focused on identifying and exploiting system vulnerabilities and misconfigurations that could lead to elevated privileges in a Linux Bash environment.
Linux systems are frequently used to serve web applications. Knowledge of how to escalate privileges would be valuable to a pentester who has exploited a web application and gained a low-privilege shell.
The next chapter will examine post-exploitation persistence and pivoting in a Linux Bash environment.