08. Metasploit Post Exploitation Privilege Escalation
Privilege Escalation Post-Exploitation¶
Privilege escalation techniques allow you to gain higher-level access after initial compromise.
Common Techniques¶
-
Identify Kernel Vulnerabilities: Run
local_exploit_suggesteron Meterpreter: -
Linux Privilege Escalation:
- Find SUID binaries:
-
Exploit writable
Add a new user with this hash topasswdfile: If/etc/passwdis writable:/etc/passwd. -
Windows Privilege Escalation:
- Enumerate Privileges:
-
Exploit AlwaysInstallElevated: Check if enabled:
If enabled, create an MSI payload and execute: -
Use Exploits: Exploit vulnerable software for privilege escalation, e.g.: