Privilege Escalation Through Linux Configurations

# Introduction In this lab, we will learn how to find and exploit sensitive configuration files on a Linux system to escalate our privileges to root. The goal is to gain a deeper understanding of web service configuration files and user-related configuration files, and how to leverage them for privilege escalation. We will assume that we have already obtained a low-privileged shell, such as the `www-data` user, through a web vulnerability, and we will explore techniques to elevate our access to root.

|
60 : 00

Click the virtual machine below to start practicing