Checklist
Attack
Service Exploits
Weak File Permissions - Readable /etc/shadow
Weak File Permissions - Writable /etc/shadow
Weak File Permissions - Writable /etc/passwd
Sudo - Shell Escape Sequences
Sudo - Environment Variables
Cron Jobs - File Permissions
Cron Jobs - PATH Environment Variable
Cron Jobs - Wildcards
SUID / SGID Executables - Known Exploits
SUID / SGID Executables - Shared Object Injection
SUID / SGID Executables - Environment Variables
SUID / SGID Executables - Abusing Shell Features (#1)
SUID / SGID Executables - Abusing Shell Features (#2)
Passwords & Keys - History Files
Passwords & Keys - Config Files
Passwords & Keys - SSH Keys
NFS
Kernel Exploits
Privilege Escalation Scripts
Last updated