OSCP Playbook
Search
⌃
K
OSCP Playbook
Search
⌃
K
Introduction
General
Learning tips
How to hack without Metasploit
Port scanning
Nmap Scanning
Nmap Scripts
Services Enumeration
SNMP
HTTP(S)
NFS
SMB
DNS
FTP
MsSQL
Oracle
Telnet
TFTP
SSH
SMTP
RDP
POP3
MySQL
LDAP
Kerberos
Finger
(MS)RPC
Password attack (Brute-force)
Brute-force service password
Wordlist dictionary
Cracking Password
Custom wordlist
Reverse Shell
Cheatsheet
Msfvenom
Linux reverse shell
Interactive TTYs Shell
Listener setup
Linux Post Exploitation
Post Exploitation methodology
Checklist
Exploiting SUID Executables
Exploiting SUDO Users
Linux exploitation
Linux post exploitation scripts
Linux Post Exploitation Command List
Windows Post exploitation
General
Windows PrivEsc Technique
Automated enumeration script
Resources Windows Post Exploitation
Manual enumeration
Others
Active Directory attack
Port Forwarding / SSH Tunneling
File transfer Methodology
BOF tips
Powered By
GitBook
Comment on page
Exploiting SUID Executables
How to Find SUID Files
find / -perm -u=s -type f 2>/dev/null
find / -user root -perm -4000 -print 2>/dev/null
Common exploitable SUID executable
Nmap
Vim
find
Bash
More
Less
Nano
cp
Resources
Linux Privilege Escalation using SUID Binaries
https://pentestlab.blog/2017/09/25/suid-executables/
Linux Post Exploitation - Previous
Checklist
Next - Linux Post Exploitation
Exploiting SUDO Users
Last modified
1yr ago