Things to try:
Search Kernel Exploits (reffer to CVE Ressources)
Check SUDO permissions
SUID
Capabilities
Cron jobs
PATH abuse
NFS
Check if user has sudo rights with:
sudo -l
If there is, you can compare list of sudo allowed binaries to the list of sudo vulnerable on GTFOBinsarrow-up-right.
GTFOBinsarrow-up-right: Use this to find which software can be use to bypass security and escalate privileges.
LinPEASarrow-up-right - Linux Privilege Escalation Awesome Scripts
LinEnumarrow-up-right
LESarrow-up-right - Linux Exploit Suggester
Last updated 2 years ago