After you’ve popped a shell on an OSCP machine, chances are you are going to need to escalate your privileges before getting that sweet root.txt. I’ve noticed that a lot of PWK students tend to struggle with privilege escalation on Windows and Linux, including myself. Here are some mind maps that I have created to aid with this knowledge gap. I’ve also created videos to show off some of these privilege escalation methods in detail.
Note: These are originally from the OSCP Windows Privilege Escalation Methodology and OSCP Linux Privilege Escalation Methodology videos I put out a few months ago.
Linux
Linux Privilege Escalation Videos:
- Exploiting sudo access
- Exploiting SUID
- Writeable root PATH
- Cracking /etc/shadow
- Kernel exploits
- NFS no_root_squash
- Docker group
- LXD group
- Sudo + LD_PRELOAD
Windows
Windows Privilege Escalation Videos: