Understanding Privilege Escalation in CentOS

15 minutes
  • 2 Learning Objectives

About this Hands-on Lab

As a system administrator, most of your work can be done as your specific user. There are many tasks, however, that need to be done as the `root` user to work correctly. In this hands-on lab, you’ll be able to practice different methods of privilege escalation.

Learning Objectives

Successfully complete this lab by achieving the following learning objectives:

Add `bob` to `sudoers` File
  1. Become root:

    sudo -i

    Enter the cloud_user password.

  2. Open the sudoers file:

  3. Add the following somewhere after the root permissions are defined:

Allow `adam` to Use the `journalctl` Command as `root`
  1. Open the sudoers file:

  2. Add the following somewhere after the root permissions are defined:

    adam  ALL=(root)    NOPASSWD: /bin/journalctl

Additional Resources

As part of your onboarding, you've been tasked with setting a server up so that bob is a superuser. Set bob up so no password is required when he uses the sudo command and he can run any command. In addition, set up adam to be able to run the journalctl command as root without being prompted for a password.

Note: Please give this lab an extra minute or two before starting the tasks.

What are Hands-on Labs

Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.

Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!

Get Started
Who’s going to be learning?