Linux Privilege Escalation
These examples try to solve the following scenario:
- the attacker has low-level (non-
root
) access to a virtual machine through SSH. - they know their username and the respective password
- and want to become the all powerful root user (
uid=0
)
Example Implementations
These examples are currently available through our github repository:
Example | Domain | Summary | Described in |
---|---|---|---|
initial example | linux priv-esc | good first example | initial post, tools and configuration |
react agent | linux priv-esc | use langgraph to reduce code | Using create_react_agent |
plan-and-execute | linux priv-esc | multi-layer planing | Adding Plan-and-Execute Planner |