- Enumaeration for Privilege Escalation
| tools to find weak sudo permissions, vulnerable suid/sgid executables, impoperly configured cron jobs, vulnerable services, and kernel exploits - Sudo
| The switch user command "su" can be used to change user context, and can be used to become the superuser (root) in order to perform system administration - SUID/SGID | Allow users to preoform privileged actions.
- Cron Jobs | The Linux version of schedule tasks, give users the ability to run commands/scripts at specified times.
- world writable files/directories | Locations where any users may write to a file.
- Boot Process Persistence | rootkits/ratkits are the hardest to detect but could
- Cron Jobs | set a job to give you access in someway
- Artifact | Any everdence left behind
- Logging | Diffent linux types will have diffent logs and log locations