Cheatsheet
Introduction
Information Gathering
Environment-based Privilege Escalation
Permissions-based Privilege Escalation
Service-based Privilege Escalation
Linux Internals-based Privilege Escalation
Recent 0-Days
Hardening Considerations
Skills Assessment