performing-privilege-escalation-on-linux
mukul975/Anthropic-Cybersecurity-Skills
This guide details advanced techniques used in red teaming and penetration testing to elevate user privileges from a low-level account to root access on a compromised Linux system. It covers exploiting misconfigurations, vulnerable services (like SUID/SGID binaries), improper sudo rules, kernel vulnerabilities (e.g., Dirty Pipe), and abuse of system services like Cron jobs and Systemd. Essential for authorized security assessments.