Member-only story
Linux PrivEsc Tryhackme Writeup
Room link: https://tryhackme.com/room/linuxprivesc
Note: This room is Free
Task 1: Deploy the Vulnerable Debian VM
This room is aimed at walking you through a variety of Linux Privilege Escalation techniques. To do this, you must first deploy an intentionally vulnerable Debian VM. This VM was created by Sagi Shahar as part of his local privilege escalation workshop but has been updated by Tib3rius as part of his Linux Privilege Escalation for OSCP and Beyond! course on Udemy. Full explanations of the various techniques used in this room are available there, along with demos and tips for finding privilege escalations in Linux.
Make sure you are connected to the TryHackMe VPN or using the in-browser Kali instance before trying to access the Debian VM!
SSH should be available on port 22. You can login to the “user” account using the following command:
ssh user@10.10.25.177
If you see the following message: “Are you sure you want to continue connecting (yes/no)?” type yes and press Enter.