<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Linux on Hack the Galaxy</title>
    <link>https://johnjhacking.com/categories/linux/</link>
    <description>Recent content in Linux on Hack the Galaxy</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-gb</language>
    <lastBuildDate>Mon, 10 Aug 2020 06:00:00 +0000</lastBuildDate><atom:link href="https://johnjhacking.com/categories/linux/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Linux Privilege Escalation: Quick and Dirty</title>
      <link>https://johnjhacking.com/blog/linux-privilege-escalation-quick-and-dirty/</link>
      <pubDate>Mon, 10 Aug 2020 06:00:00 +0000</pubDate>
      
      <guid>https://johnjhacking.com/blog/linux-privilege-escalation-quick-and-dirty/</guid>
      <description>Linux Privilege Escalation: Quick and Dirty Automated Tooling Usually, my approach is to use an automated tool in conjunction with some manual enumeration. However, you can completely accomplish the Privilege Escalation process from an automated tool paired with the right exploitation methodology.
1. Linpeas.sh (my go-to, fully automated)
https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS
2. Linprivchecker.py (my backup)
https://github.com/sleventyeleven/linuxprivchecker/blob/master/linuxprivchecker.py
3. Linux-Exploit-Suggest-2.pl (To look for those sneaky little Kernel Exploits)
https://github.com/jondonas/linux-exploit-suggester-2
Resources Keep in mind, that these are just some of the techniques I have used.</description>
    </item>
    
  </channel>
</rss>
