Got Root? A Linux Priv-Esc Benchmark

Andreas Happe,Jürgen Cito
2024-05-06
Abstract:Linux systems are integral to the infrastructure of modern computing environments, necessitating robust security measures to prevent unauthorized access. Privilege escalation attacks represent a significant threat, typically allowing attackers to elevate their privileges from an initial low-privilege account to the all-powerful root account.
Cryptography and Security
What problem does this paper attempt to address?
This paper aims to build a benchmarking platform for Linux privilege escalation (PE) to evaluate the effectiveness of human and automated tools in conducting PE attacks against Linux systems. Linux systems are crucial in modern computing environments and require robust security measures to prevent unauthorized access. PE attacks pose a significant threat, allowing attackers to elevate their privileges from a low-privileged account to the all-powerful root account. The paper points out that existing benchmarking sets lack precise evaluation of such attacks, particularly the absence of standardized environments for comparing human and automated tool performance. To address this, the authors developed a comprehensive Linux PE benchmark that includes a virtual system with vulnerabilities that grant low-privileged access and can lead to root-level access. The testing environment should run within a local network and be isolated to ensure the security of the host system. Additionally, each virtual machine contains only a single vulnerability or attack path, and all virtual machines will be released in an open-source format to promote extensibility and transparency. The authors analyzed attack categories in CTF (Capture the Flag) competitions and online training platforms, selecting vulnerabilities based on configuration errors rather than specific software versions. The benchmark they created encompasses different vulnerability categories like SUID/Sudo files, privilege groups/Docker, information disclosure, etc., and maps these test cases to the MITRE ATT&CK framework. To simulate human hackers' behavior, hints are provided for each test case. With this new benchmark, researchers can gain in-depth insights into the capability of privilege escalation and improve defense strategies to better protect Linux systems from potential destructive attacks. The paper concludes by emphasizing that automation tools often focus on improving the efficiency of system enumeration while still relying on manual operations for analysis and exploitation, highlighting the crucial difference between automation and manual processes in Linux privilege escalation scenarios.