TryHackMe Linux Privilege Escalation: Automation | Full Walkthrough 2026
Build on Linux privilege escalation skills: automate enumeration and use public exploits. π€π€ Room link: https://tryhackme.com/room/linprivautomation π― Learning Objectives π― π Demonstrate privilege escalation enumeration using automated tools π Demonstrate privilege escalation techniques using public exploits π Understand Linux process snooping π― Tools and Scripts used in the video : π― π shell.c: https://github.com/djalilayed/tryhackme/blob/main/Linux_Privilege_Escalation_Automation/shell.c π Commands used: https://github.com/djalilayed/tryhackme/tree/main/Linux_Privilege_Escalation_Automation π pspy - unprivileged Linux process snooping: https://github.com/DominicBreuker/pspy π CVE-2025-32463: https://github.com/kh4sh3i/CVE-2025-32463 π― Room Tasks: π― π Task 1: Introduction π Task 2: Automated Enumeration Tools - Run Linux Exploit Suggester to enumerate the target host. What CVE is listed as the first Possible Exploit the target is vulnerable to? π Task 3: Privilege Escalation: Public Exploits - Exploit the previously identified vulnerability. What is the content of /root/flag.txt? π Task 4: pspy - Unprivileged Process Monitoring - What is the full path of the script vulnerable to privilege escalation? - What is the flag in /root/flag.txt? π Task 5: Challenge - What are the contents of /home/frank/flag.txt? - What are the contents of /root/flag.txt? π Task 6: Conclusion β οΈ Educational Purpose Only This content is for educational and authorized penetration testing purposes only. Always ensure you have permission before testing on any systems. Don't forget to π LIKE and π SUBSCRIBE for more cybersecurity tutorials! #TryHackM
Download
0 formatsNo download links available.