Academy

Module 5 Β· Privilege Escalation Defence πŸ”’

Manish Garg
Manish Garg Associate CISSP Β· RingSafe
April 19, 2026
4 min read

Root escalation β€” getting from “regular user” to “root” or SYSTEM β€” is how most breaches turn catastrophic. A foothold becomes domain compromise via privilege escalation. This module covers the technique classes, the defences, and what a practitioner should be able to recognise on both the offensive and defensive sides.

The privesc landscape

Privilege escalation falls into five broad buckets:

  1. Kernel exploits β€” memory-corruption or logic bugs in the OS kernel grant root
  2. Misconfigurations β€” setuid binaries, writable sudoers, cron jobs running as root
  3. Weak credentials β€” reused passwords, password in memory, SSH key theft
  4. Service exploitation β€” privileged services with exploitable bugs (systemd, polkit, cron)
  5. Stored credentials β€” AWS keys on disk, tokens in env, credentials in shell history

Classic Linux privesc patterns

SUID binaries

Any binary with setuid root permission runs as root when executed by any user. Legitimate: passwd, sudo, ping. Dangerous: custom scripts, old packages.

πŸ” Advanced Module Β· Pro Tier

Continue reading with Pro tier (β‚Ή4,999/year)

You've read 25% of this module. Unlock the remaining deep-dive, quiz, and every other Advanced/Expert module.

136+ modulesAll levels up to this tier
20-question quizzesUnlimited retries with explanations
Completion certificatesShareable on LinkedIn
6 more sections locked below