Skip to content

Linux Privilege Escalation

These examples try to solve the following scenario:

  • the attacker has low-level (non-root) access to a virtual machine through SSH.
  • they know their username and the respective password
  • and want to become the all powerful root user (uid=0)

Example Implementations

These examples are currently available through our github repository:

Example Domain Summary Described in
initial example linux priv-esc good first example initial post, tools and configuration
react agent linux priv-esc use langgraph to reduce code Using create_react_agent
plan-and-execute linux priv-esc multi-layer planing Adding Plan-and-Execute Planner