Chapter 11: Linux Password Mining
Now that you have an understanding of how to utilize kernel exploits on Linux in order to elevate your privileges, we can begin exploring the process of searching for and identifying locally stored credentials on Linux systems. This process will involve searching for specific passwords and application credentials that can be used to elevate our privileges directly, without the use of any exploits.
This chapter will focus on the various tools and techniques that can be used to find and identify passwords that can consequently provide us with an elevated session.
We will start off by taking a look at how to extract passwords and credentials stored in memory, after which we will take a look at how to identify credentials ...
Get Privilege Escalation Techniques now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.