Back to Browse

TryHackMe Linux Privilege Escalation: Automation | Full Walkthrough 2026

11 views
May 21, 2026
26:31

Build on Linux privilege escalation skills: automate enumeration and use public exploits. πŸ€–πŸ€– Room link: https://tryhackme.com/room/linprivautomation 🐯 Learning Objectives 🐯 🐈 Demonstrate privilege escalation enumeration using automated tools 🐈 Demonstrate privilege escalation techniques using public exploits 🐈 Understand Linux process snooping 🐯 Tools and Scripts used in the video : 🐯 🐈 shell.c: https://github.com/djalilayed/tryhackme/blob/main/Linux_Privilege_Escalation_Automation/shell.c 🐈 Commands used: https://github.com/djalilayed/tryhackme/tree/main/Linux_Privilege_Escalation_Automation 🐈 pspy - unprivileged Linux process snooping: https://github.com/DominicBreuker/pspy 🐈 CVE-2025-32463: https://github.com/kh4sh3i/CVE-2025-32463 🐯 Room Tasks: 🐯 🐈 Task 1: Introduction 🐈 Task 2: Automated Enumeration Tools - Run Linux Exploit Suggester to enumerate the target host. What CVE is listed as the first Possible Exploit the target is vulnerable to? 🐈 Task 3: Privilege Escalation: Public Exploits - Exploit the previously identified vulnerability. What is the content of /root/flag.txt? 🐈 Task 4: pspy - Unprivileged Process Monitoring - What is the full path of the script vulnerable to privilege escalation? - What is the flag in /root/flag.txt? 🐈 Task 5: Challenge - What are the contents of /home/frank/flag.txt? - What are the contents of /root/flag.txt? 🐈 Task 6: Conclusion ⚠️ Educational Purpose Only This content is for educational and authorized penetration testing purposes only. Always ensure you have permission before testing on any systems. Don't forget to πŸ‘ LIKE and πŸ”” SUBSCRIBE for more cybersecurity tutorials! #TryHackM

Download

0 formats

No download links available.

TryHackMe Linux Privilege Escalation: Automation | Full Walkthrough 2026 | NatokHD