Linux Security

Linux Security

Linux privilege escalation techniques, system hardening, and vulnerability exploitation for penetration testing and security assessments.

Dec 11, 2025
Updated Dec 11, 2025
2 min read

Overview

Linux systems power critical infrastructure, servers, and embedded devices worldwide. Understanding Linux security is essential for comprehensive penetration testing and security assessments. This section covers privilege escalation techniques, common misconfigurations, and system hardening strategies.

Privilege Escalation Techniques

Sudo & Permissions

Code Execution & Injection

Scheduled Tasks & Services

Kernel Exploitation

System Hardening

Attack Methodology

Phase 1: Enumeration

Run LinPEAS or LinEnum to identify:

  • User privileges and group memberships
  • Sudo permissions and SUID binaries
  • Cron jobs and scheduled tasks
  • Kernel version and installed software
  • File permissions and capabilities
  • Network services and configurations

Phase 2: Privilege Analysis

Look for:

  • Dangerous sudo rules (NOPASSWD, wildcards)
  • SUID/SGID binaries
  • Writable files in privileged locations
  • Exploitable capabilities
  • Cron jobs with path injection points
  • Outdated kernel versions

Phase 3: Exploitation

  • Leverage identified misconfigurations
  • Exploit vulnerable software versions
  • Abuse intended functionality
  • Chain multiple vulnerabilities

Phase 4: Persistence

  • SSH key installation
  • Cron job backdoors
  • Modified system binaries
  • PAM backdoors
  • Kernel module rootkits

Essential Enumeration Tools

ToolPrimary Use
LinPEASAutomated privilege escalation enumeration
LinEnumSystem enumeration script
pspyProcess monitoring without root
GTFOBinsSUID/sudo exploit database

Common SUID Binaries

Many standard binaries can be exploited when SUID:

  • /usr/bin/find
  • /usr/bin/vim
  • /usr/bin/nmap
  • /usr/bin/python
  • /usr/bin/perl

Check GTFOBins for exploitation techniques.

Last updated on

Linux Security | Drake Axelrod