# Introduction Linux systems rely on the `/etc/passwd` and `/etc/shadow` files for user authentication and access control. If system administrators misconfigure permissions or contents of these files, it can create opportunities for privilege escalation attacks. In this lab, you will learn how to leverage the `/etc/shadow` file to gain root privileges on a Linux system. This scenario assumes you have already obtained initial low-privileged shell access as a regular user.
Click the virtual machine below to start practicing