Summary
In this chapter, we got started by taking a look at how to extract application passwords from memory with the GDB. We then took an in-depth look at how to search for and identify passwords in configuration files, both manually and automatically. We finally ended the chapter by taking a look at how to locate passwords from the bash_history
file of a particular user.
Now that we have learned how to elevate our privileges by finding locally stored passwords on Linux systems, we can begin exploring other Linux privilege escalation vectors.
In the next chapter, we will explore the process of elevating our privileges through misconfigured scheduled tasks.