Highlight: THM Common Linux Privesc [Sub] [Easy] [Complete Beginner Path]
### Common Linux Privesc
A room explaining common Linux privilege escalation
[https://tryhackme.com/room/commonlinuxprivesc](https://tryhackme.com/room/commonlinuxprivesc)
This room will explore common Linux Privilege Escalation vulnerabilities and techniques!
What does "privilege escalation" mean?
At it's core, Privilege Escalation usually involves going from a lower permission to a higher permission. More technically, it's the exploitation of a vulnerability, design flaw or configuration oversight in an operating system or application to gain unauthorized access to resources that are usually restricted from the users.
Why is it important?
Rarely when doing a CTF or real-world penetration test, will you be able to gain a foothold (initial access) that affords you administrator access. Privilege escalation is crucial, because it lets you gain system administrator levels of access. This allow you to do many things, including:
Reset passwords
Bypass access controls to compromise protected data
Edit software configurations
Enable persistence, so you can access the machine again later.
Change privilege of users
Get that cheeky root flag ;)
As well as any other administrator or super user commands that you desire. -- Watch live at https://www.twitch.tv/msec