A security audit revealed that a low-privileged user account (developer) on server dev-web-01 escalated to root privileges at 09:45 UTC on November 28, 2025. The user leveraged a misconfigured sudo rule to gain unauthorized administrative access. Your mission is to analyze authentication logs and system configurations to determine how the privilege escalation occurred.
Privilege escalation is the act of exploiting vulnerabilities or misconfigurations to gain elevated privileges on a system. On Linux, this typically means escalating from a standard user to root (UID 0).
Purpose: Allows permitted users to execute commands as the superuser or another user, as specified in /etc/sudoers.
Why It's Dangerous When Misconfigured: Overly permissive sudo rules can allow users to run commands that spawn shells, edit system files, or execute arbitrary code as root.
Common Mistake: Allowing sudo access to powerful binaries like vi, less, find, or python without understanding they can be abused to break out to root shells.
Purpose: Records authentication events including sudo command execution with timestamps, users, and commands run.
What to Look For: Repeated sudo usage, attempts to edit sensitive files, spawning of shells (bash, sh), and commands known for privilege escalation.
Format: user/group host=(run_as_user) command
Example: developer ALL=(ALL) NOPASSWD: /usr/bin/vi
Risk: The above rule allows developer to run vi as root without password. From vi, you can execute :!/bin/bash to get a root shell.
💡 Pro Tip: GTFOBins (gtfobins.github.io) is a curated list of Unix binaries that can be used to bypass security restrictions. Always check sudo-allowed binaries against GTFOBins before granting permissions.
Run bash commands to analyze the logs. Available: cat, grep, wc, awk, sort, uniq, sudo, clear, help
This section auto-fills once all tasks are completed correctly.
Complete all tasks to reveal the attack chain.
The privilege escalation succeeded because:
1. Overly permissive sudo rule allowed /usr/bin/find without password
2. find binary can execute arbitrary commands via -exec flag
3. No monitoring or alerting on sudo abuse
4. Developer account had unnecessary elevated privileges
5. Sudoers configuration not regularly audited against GTFOBins