# Linux Privesc Checklist

> Adapt it to your methodology and the context of your test.\
> Download this file locally from [here](https://raw.githubusercontent.com/CSbyGB/pentips/main/checklists/web-and-api-pentest-checklist.md) this way you can check everything you have done.

* [ ] Enumerate system
  * See [here](https://csbygb.gitbook.io/pentips/linux/privesc)
* [ ] Enumerate user
  * See [here](https://csbygb.gitbook.io/pentips/linux/privesc)
* [ ] Enumerate network
  * See [here](https://csbygb.gitbook.io/pentips/linux/privesc)
* [ ] Enumerate password
  * See [here](https://csbygb.gitbook.io/pentips/linux/privesc)
* [ ] Check for password and file permissions
  * See [here](https://csbygb.gitbook.io/pentips/linux/privesc/pass-file-perm) and [here](https://csbygb.gitbook.io/pentips/linux/privesc#password-hunting)
* [ ] Check for Sudo
  * See [here](https://csbygb.gitbook.io/pentips/linux/privesc/sudo)
* [ ] Check for SUID
  * See [here](https://csbygb.gitbook.io/pentips/linux/privesc/suid)
* [ ] Check for Capabilities
  * See [here](https://csbygb.gitbook.io/pentips/linux/privesc/capabilities)
* [ ] Check for Scheduled Tasks
  * See [here](https://csbygb.gitbook.io/pentips/linux/privesc/cron)
* [ ] Check for NFS Root Squashing
  * See [here](https://csbygb.gitbook.io/pentips/linux/privesc/nfs-root-squashing)
* [ ] Check Services
  * See [here](https://csbygb.gitbook.io/pentips/linux/privesc/services)
* [ ] Check for PATH Abuse
  * See [here](https://csbygb.gitbook.io/pentips/linux/privesc/path)
* [ ] Check for Wildcard Abuse
  * See [here](https://csbygb.gitbook.io/pentips/linux/privesc/wildcard)
* [ ] Check for Privilege groups
  * See [here](https://csbygb.gitbook.io/pentips/linux/privesc/groups)
* [ ] Check for Kernel Exploits
  * See [here](https://csbygb.gitbook.io/pentips/linux/privesc/kernel)
* [ ] Check for homemade scripts

## Other checklists

* [Linux Privesc Checklist - PayloadAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://csbygb.gitbook.io/pentips/checklist/linux-privesc-checklist.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
