Introduction

What?

There are many ways to escalate linux privileges. These are the most common methods based on common real-world misconfigurations and flaws.

Why?

Gain access to additional users, hosts, and resources, be able to take action, like install software, to get user data that can possibly give access to even more sites or systems, destroy or alter audit trails to hide tracks of having been there, etc.

How?