🖍️
nullbrain
search
Ctrlk
  • Intro
  • Tools
    • Preparation
  • basics/pre-req
    • Backpack
    • Linux
  • Working Tools
    • List of Note taking tools!
  • Practice Tools
    • Netcat
    • Socat
    • Powercat
    • PowerShell
  • Network Analysis Tools
    • Wireshark
    • Tcpdump
  • PRIVILEGE ESCALATIONchevron-right
  • Passive Information Gathering
    • Index
    • Toolschevron-right
    • Techniqueschevron-right
  • Active Information Gathering
    • Enumerationchevron-right
    • Masscan
    • Nmap
    • Port Scanning
    • DNSchevron-right
  • Vulnerability Scanning
    • Vulnerability Scanning
    • Nmap
  • Web Application Exploit
    • Enumerationchevron-right
    • Toolschevron-right
  • Buffer Overflow
    • Memory
  • Real World!
    • Bruteforce
    • Tools
    • Enumerationchevron-right
    • SQL Injection
    • Server-Side Template Injection
    • Hashcatchevron-right
    • Web Reconnaissance
    • Recon
    • Port Scanning
    • Privilege escalationchevron-right
      • File permissions
      • Service Exploits
      • Kernel Exploits
      • Privilege Checker
      • snapd
      • SUID
      • Splunk
    • Reverse Shellchevron-right
    • PHP
    • Exploits & Footholdschevron-right
  • Checklist (CTF targetted)
    • checklist
  • Malicious payload
    • Metasploit APK
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Real World!chevron-right
  2. Privilege escalation

Privilege Checker

few tools out there:

https://github.com/linted/linuxprivcheckerarrow-up-right https://github.com/AlessandroZ/BeRootarrow-up-right http://pentestmonkey.net/tools/audit/unix-privesc-checkarrow-up-right

PreviousKernel Exploitschevron-leftNextsnapdchevron-right

Last updated 4 years ago