Back to BlogsEthical Hacking

Privilege Escalation in Linux — From User to Root

Anuj Singh (Admin) 18 March 2026 431 views

Linux Privilege Escalation

After getting initial access to a system, the next step is escalating from a low-privilege user to root (administrator).

Common Techniques

  • SUID Binaries: find / -perm -4000 — Find files that run as root
  • Sudo Misconfiguration: sudo -l — Check what you can run as root
  • Cron Jobs: Writable scripts executed by root
  • Kernel Exploits: uname -a — Check for known vulnerable kernels
  • Writable /etc/passwd: Add a new root user

Tools

  • LinPEAS: Automated Linux privesc scanner
  • GTFOBins: Database of exploitable Linux binaries

Learn privilege escalation in our comprehensive ethical hacking course.

Want to Learn This Practically?

Subscribe to ONLY4YOU and get hands-on access to 40+ premium courses — Ethical Hacking, Kali Linux, Metasploit, Network Hacking, Bug Bounty & more!