Linux Privilege Escalation – Credentials Harvesting
Introduction
Linux-based operating systems and applications often store clear text, encoded or hashed credentials in files or in memory.
When gaining initial access to a Linux machine and performing privilege escalation enumeration steps, often passwords can be found through these means and they can be used to further escalate privileges.
There are various methods to harvest credentials in a Linux system in order to escalate privileges, the following ones are the most common and they are always worth a try.
Read more