# Introduction In this lab, you will learn about the sudo configuration file syntax and practice three common methods to escalate privileges through sudo vulnerabilities or misconfigurations. The goal is to gain a better understanding of how to leverage sudo for privilege escalation during a penetration test.
Click the virtual machine below to start practicing