![linux privilege escalation research paper](/assets/img/research-paper/preview/linux-privilege-escalation-research-paper.png)
Security Research
A Hands-on Approach to Linux Privilege Escalation
This paper intends to provide multiple techniques that pentester can use to escalate their privileges and gain access to higher roles in Linux based operating systems.
Key Pointers:
- Linux Privilege Escalation can be of many types. The types discussed in this document are:
- Privilege Escalation by kernel exploit
- Privilege Escalation by Password Mining
- Privilege Escalation by Sudo
- Privilege Escalation by File Permissions
- Privilege Escalation by Crontab
- Setting up labs and performing the escalations.
- Discussing the mitigations to prevent such privilege escalation exploits.
Brands that
trust our competence
Explore more![kfc logo](/assets/img/homee/customers/logos/kfc-logo.png)
![discover logo](/assets/img/homee/customers/logos/discover-financial-services.png)
![adp logo](/assets/img/homee/customers/logos/adp.png)
![adbed bath beyond logo](/assets/img/homee/customers/logos/bed-bath-and-beyond.png)
![expedia logo](/assets/img/homee/customers/logos/expedia.png)
![chipotle logo](/assets/img/homee/customers/logos/chipotle-mexican-grill-inc.png)
![molina](/assets/img/homee/customers/logos/molina.png)
![Mosaic Insurance logo](/assets/img/homee/customers/new-logos/mosaic-insurance.png)
![](/assets/img/homee/customers/logos/cedar-sinai.png)
![dell logo](/assets/img/homee/customers/logos/dell.png)
![fannie-mae logo](/assets/img/homee/customers/logos/fannie-mae.png)
![maersk logo](/assets/img/homee/customers/logos/maersk.png)
![gsk logo](/assets/img/homee/customers/new-logos/gsk.png)
![wiz logo](/assets/img/homee/customers/new-logos/wiz.png)
![bt logo](/assets/img/homee/customers/new-logos/bt.png)