🛡️ Challenge 04 • Privilege Escalation Detection

Offline Level 4 Sudo Abuse
💡 Next Hint: 30s

Mission Brief

A security audit revealed that a low-privileged user account (developer) on server dev-web-01 escalated to root privileges at 09:45 UTC on November 28, 2025. The user leveraged a misconfigured sudo rule to gain unauthorized administrative access. Your mission is to analyze authentication logs and system configurations to determine how the privilege escalation occurred.

⚠️ SYNTHETIC SCENARIO
All log data, usernames, commands, and sudo configurations in this challenge are synthetically generated for training purposes. No real security incidents are represented.

Available Artifacts

  • /var/log/auth.log – Sudo command execution and authentication events
  • /var/log/syslog – System events and user activity
  • /etc/sudoers – Sudo configuration file
  • ~/.bash_history – Command history for developer user

Learning Objectives

  • Identify sudo misconfigurations that enable privilege escalation
  • Analyze sudo logs to trace unauthorized elevated commands
  • Understand GTFOBins techniques for privilege escalation
  • Correlate command history with auth logs
  • Recognize post-exploitation activities with root access