Linux Privilege Escalation
These examples try to solve the following scenario:
- the attacker has low-level (non-
root) access to a virtual machine through SSH. - they know their username and the respective password
- and want to become the all powerful root user (
uid=0)
Example Implementations
These examples are currently available through our github repository:
| Example | Domain | Summary | Described in |
|---|---|---|---|
| initial example | linux priv-esc | good first example | initial post, tools and configuration |
| react agent | linux priv-esc | use langgraph to reduce code | Using create_react_agent |
| plan-and-execute | linux priv-esc | multi-layer planing | Adding Plan-and-Execute Planner |