🐧 Linux Privilege Escalation Lab

PRACIVO LAB — INTENTIONALLY VULNERABLE
⚠️ Pracivo Security Lab — Linux privilege escalation techniques. Start as a low-privilege user and escalate to root.
Lab Credentials: ram / pracivo  |  alice / alice123  |  root / toor (goal: escalate to this)

Linux PrivEsc — Attack Paths

You are logged in as: guest (uid=9999)

TechniqueWhat It IsLab
SUID BinariesBinaries that run as root regardless of who executes themPractice →
Sudo MisconfigurationUser allowed to run specific commands as rootPractice →
Writable Cron JobsScript run by root cron is writable by low-priv userPractice →
PATH HijackingRoot script calls command without full pathPractice →
Writable /etc/passwdIf writable, add your own root userPractice →
Environment VariablesLD_PRELOAD abuse with sudoPractice →