
30 Privilege Escalation Patterns Every OSCP Candidate Must Know: My Brutal, Proven Path from Panic to a Pass
The first time I took the OSCP exam, I didnโt get wrecked by a buffer overflow or some obscure exploit chain. NopeโI got owned by privilege escalation. Hard. I had low-privilege shells on almost every box, felt like a digital god for a minuteโฆ and then proceeded to spend hours poking around like a blind raccoon in a server room. By the end, all I had to show for it was a headache, a sad half-baked report, and a very strong craving to scream into the void.
If youโre in that same miserable cycleโrunning a bit of LinPEAS, throwing whatever local exploit looks vaguely promising, watching the clock tick louder with every failed attemptโlisten: youโre not bad at hacking. Youโre not dumb. Youโre just missing a few key patterns.
See, privilege escalation isnโt magic. It feels like magic when it works, but itโs really just about knowing what to look forโand knowing how to look when your brain is fried and youโre three energy drinks deep.
Thatโs exactly what this guide is for. Iโve put together the 30 privesc patterns I wish I had burned into my brain before my own OSCP meltdown. These are the habits, tricks, and mental checklists that wouldโve saved me from flailing around at 4 a.m. in a puddle of self-doubt.
Weโll keep things practical. A little funny. Brutally honest. No fluff. Just the real stuff that actually helps when youโre staring at a low-priv shell and starting to question your life choices.
If youโve got 10 minutes, Iโll show you how to stop panicking and start pulling signal out of the noise. Letโs turn that โI hope I passโ into โI did pass.โ
Table of Contents
Why Privilege Escalation Feels Impossible Until It Clicks
On my first OSCP attempt, I had a beautiful low-privilege shell on the highest-value boxโฆ and then spent two hours copy-pasting random exploit scripts like a raccoon digging through someone elseโs trash. Every failure felt personal. Every โSegmentation faultโ felt like a performance review.
Hereโs the uncomfortable truth: privilege escalation is not about memorizing tricks; itโs about recognizing patterns under pressure. The exam gives you roughly a day for everything, and if you burn 90 minutes chasing a kernel exploit that never had a chance, youโre effectively paying premium exam fees to watch yourself panic.
Once I started treating privesc as a small set of repeatable patternsโthings I could literally read out loud when my brain went foggyโmy hit rate went up, my report got cleaner, and my second exam attempt finally crossed the line from โmaybeโ to โpassed.โ This article is that pattern list, cleaned up and battle-tested.
- Stop chasing one-off tricks.
- Run the same small sequence every time.
- Use your notes as a script when youโre tired.
Apply in 60 seconds: Write โPatterns, not panicโ at the top of your privesc notes as a reminder for your next lab session.

How to Use These 30 Privilege Escalation Patterns Without Overwhelm
Quick promise: I am not about to hand you 30 new things to memorize. Youโre already juggling a job, a life, and an exam bill that feels like a small car payment.
Instead, think of these patterns as three stacked checklists:
- Patterns 1โ8: โDid I actually enumerate properly?โ
- Patterns 9โ18: Linux moves you can run almost on autopilot.
- Patterns 19โ26: Windows moves for when winPEAS spits out a novel.
- Patterns 27โ30: Meta habits that keep you from spiraling during the exam.
On any boxโlab, Proving Grounds, Hack The Boxโyouโll run the top layer first, then drop into the Linux or Windows bucket, then finish with the meta patterns when youโre stuck. Youโre building a decision tree, not a random exploit lottery.
- Layer 1: Generic enumeration on every host.
- Layer 2: OS-specific privilege escalation patterns.
- Layer 3: Meta rules when youโre stuck or exhausted.
Apply in 60 seconds: Draw three boxes on paperโโEnum,โ โLinux,โ โWindowsโโand assign pattern ranges (1โ8, 9โ18, 19โ26) to each.
Money Block #1: Privilege Escalation Readiness Checklist
Before grinding more boxes, check if youโre ready to benefit from a focused privesc phase:
- [ ] I can reliably get low shells on easy/medium boxes.
- [ ] I have a repeatable enumeration routine (not just โrun linPEAS and prayโ).
- [ ] I know how to transfer files to and from the target without Googling every time.
- [ ] I have some way to take structured notes (Obsidian, CherryTree, markdown, anything).
- [ ] I know my exam window and retake policy so Iโm not guessing about deadlines.
If youโre missing more than two boxes, spend a week tightening footholds and note-taking before going deep on privesc patterns.
Apply in 60 seconds: Tick the boxes honestly, then decide whether your next week is โfoothold practiceโ or โprivesc practice.โ Save this checklist and confirm your current exam and lab options on OffSecโs official site.
Pattern Group 1: Enumeration-First Habits That Save Your Exam (1โ8)
Every OSCP story that starts with โI got stuck on privesc for hoursโ usually hides a quieter confession: โI didnโt really enumerate.โ These first eight patterns are boring in the same way a seatbelt is boringโright up until the moment you need it.
- Pattern 1 โ Identity snapshot first. Always start with a tiny script of commands: user, groups, hostname, OS version, kernel. It feels basic, but knowing exactly who you are and where you stand will rule out entire classes of exploits in seconds.
- Pattern 2 โ โsudo -lโ is non-negotiable. On Linux, run it early and often. Misconfigured sudo rules are some of the fastest, cleanest paths to rootโand theyโre easy to miss when youโre tired.
- Pattern 3 โ Services and versions on one page. Grab running services with versions (Linux: systemctl, ps, netstat equivalents; Windows: services and listening ports). Put them in your notes with bullet points. Vulnerable services love to hide in plain sight.
- Pattern 4 โ Scheduled tasks and cron reconnaissance. For both Linux and Windows, list scheduled tasks and cron jobs. Anything that runs with higher privileges and touches a writable path should light up your brain like a Christmas tree.
- Pattern 5 โ File system anomalies. Search for world-writable directories, backup archives, old home directories, leftover deploy folders. Weird places often hide passwords, SSH keys, or scripts you can abuse.
- Pattern 6 โ Configuration graveyard scan. Sweep for configuration files: .conf, .ini, .php, .yml, .env. Misconfigurations and forgotten credentials love to rot in these corners.
- Pattern 7 โ Logs as an intelligence source. Check logs with a purpose: can they show you commands run as root, failed scripts, or misbehaving services?
- Pattern 8 โ Credential scavenger hunt. Search for passwords and keys explicitly: browser data, SSH directories, database config, bash history. Every found credential is a potential lateral move or local admin entry point.
On one Proving Grounds box, Pattern 4 alone shaved 30 minutes off my attemptโone overlooked cron job had a writable script in /tmp, and my brain had been stuck on kernel exploits for no good reason.
โEnumeration isnโt busywork; itโs a way to buy yourself time and sanity later in the exam.โ
- Write your enum script once.
- Run it on every box, no debate.
- Paste the output into structured notes.
Apply in 60 seconds: Create a tiny enum script file and commit to running it at the start of every lab box this week.
Pattern Group 2: Linux Privilege Escalation Patterns (9โ18)
Linux is where many OSCP candidates secretly hope for a โluckyโ kernel exploit. The problem? Kernel exploits can eat an hour, crash the machine, and still leave you with nothing. These patterns push kernel exploits to the very bottom of your decision tree.
- Pattern 9 โ SUID/SGID binary review. List SUID and SGID binaries, then scan for weird or custom ones. Classic misconfigurations still show up in training labs, and theyโre often faster than any exploit.
- Pattern 10 โ Sudo misconfiguration with no password. When sudo -l shows commands you can run without a password, think: โCan I get a shell from this?โ Abusing tar, vim, less, and similar binaries becomes a reflex.
- Pattern 11 โ Cron with writable scripts. When a privileged cron job calls a script in a writable location, you effectively have scheduled root. Replace or wrap the script, wait, profit.
- Pattern 12 โ PATH hijacking. If a script is called by name (not full path) and you control the PATH or a directory early in PATH, you can insert your own binary with the same name. This is a classic โexam-night miracleโ move.
- Pattern 13 โ Library and LD_PRELOAD abuse. If the environment or service configuration allows LD_PRELOAD or uses dynamic libraries in writable paths, you can swap in your own compiled library to execute code as a higher-privileged user.
- Pattern 14 โ Linux capabilities. getcap -r / can reveal binaries with capabilities like cap_setuid or cap_net_admin. Many candidates ignore this entirely and leave an easy privesc on the table.
- Pattern 15 โ NFS and no_root_squash misconfig. If /etc/exports exposes volumes with no_root_squash, you can mount them, create a setuid shell as โroot,โ and bring it back to the target.
- Pattern 16 โ Docker or container breakout. If youโre root inside a container but not on the host, you may still have a path to the host through mounted volumes or Docker socket access.
- Pattern 17 โ Service account abuse. When you compromise a service account that writes logs or files as root, look for ways to inject payloads into those write paths.
- Pattern 18 โ Kernel exploit as last resort. Only after patterns 9โ17 are exhausted do you consider a kernel exploit. Then you match kernel version carefully, use a known-good exploit, and be ready for failure without panicking.
On one practice machine, I spent 40 minutes obsessing over Kernels of 2017, ignoring the fact that Pattern 14 was handing me a capability-misconfigured binary on a silver platter. Ten seconds of reading would have saved that entire rabbit hole.
Infographic: Linux Privilege Escalation Funnel
Step 1: Quick Checks
- sudo -l
- SUID/SGID scan
- Capabilities
Step 2: Misconfig Goldmine
- Cron + writable paths
- PATH hijacking
- Library/LD_PRELOAD tricks
Step 3: Heavy Artillery
- NFS exports
- Container breakouts
- Kernel exploits (last)
Use this funnel in your notes: you move from left to right only after youโve crossed everything off the current column.
Show me the nerdy details
In real exams and labs, these patterns intersect. For example, a Docker container might mount NFS storage with no_root_squash, giving you a hybrid of Patterns 15 and 16. Your job is not to memorize every edge case, but to recognize that youโve seen โNFS + write access + privileged userโ and know that it belongs in the same mental bucket as any other file-based privilege escalation.
- Run the quick checks first.
- Attack misconfigurations before exploits.
- Keep kernel exploits as a true last resort.
Apply in 60 seconds: Sketch the three-step funnel from the infographic into your notebook and commit to following it on your next Linux box.
Pattern Group 3: Windows Privilege Escalation Patterns (19โ26)
Windows is where many otherwise strong candidates quietly fall apart. The tooling is louder, the output is longer, and the temptation to โtry everythingโ is very real.
- Pattern 19 โ Group and role reality check. After you get a shell, enumerate group membership carefully. Local admin, backup operators, or other powerful groups may already give you more reach than you think.
- Pattern 20 โ Service misconfiguration sweep. Look for services running as SYSTEM with binaries or configs in writable locations. Youโre hunting for the classic โservice points to C:\something you own.โ
- Pattern 21 โ Unquoted service paths. When a service path includes spaces and no quotes, Windows may execute from the first matching path. If any part of that path is writable, itโs an opportunity.
- Pattern 22 โ Weak registry permissions for services. If you can modify service configuration in the registry, you can often re-point it to a binary you control.
- Pattern 23 โ AlwaysInstallElevated misconfiguration. When both relevant policy keys are set, you can create an MSI that installs as a high-privileged user. Labs still love this misconfig because it tests your ability to read output carefully.
- Pattern 24 โ Token abuse and impersonation. When you have SeImpersonatePrivilege or similar, token-based attacks can turn a boring foothold into a SYSTEM shell quickly.
- Pattern 25 โ Credential treasure hunt. Dumping LSASS is not always necessary in exam-style environments, but passwords in config files, scheduled tasks, and insecure shares are absolutely fair game.
- Pattern 26 โ Local escalation via known software flaws. Old drivers, outdated backup agents, and unpatched third-party tools show up frequently in training labs. Once you identify the version, your job is to match it with a known safe exploit in your lab environment.
On one Windows lab machine, I wasted 45 minutes chasing a token attack that was never going to work, because I didnโt read the group list carefully enough to notice I was already in a near-admin role. Pattern 19 alone would have saved almost an hour.
- Start with groups and services.
- Check paths and permissions before exploits.
- Keep a short list of your go-to Windows privesc moves.
Apply in 60 seconds: Add three Windows patterns you keep forgetting (for example, unquoted paths, AlwaysInstallElevated, weak registry ACLs) to a sticky note near your monitor.
Pattern Group 4: Meta Saves and โOh Crapโ Fixes (27โ30)
These last four patterns are not technical; theyโre about not losing your mind during a 24-ish hour exam while a clock stares at you like a judgmental boss.
- Pattern 27 โ The 30-minute re-enumeration rule. If youโve spent 30 minutes on privesc with no meaningful progress, you stop, breathe, and re-run your enumeration with fresh eyes. No exceptions. This alone can save your exam.
- Pattern 28 โ One pattern at a time. Instead of running every script and command you know, pick one pattern: โRight now I am checking cron jobsโ or โRight now I am checking SUID/SGID.โ Your brain relaxes when you reduce multitasking.
- Pattern 29 โ Live note-taking as a future you favor. Write commands and findings as if theyโre for someone else. Future youโtired, stressed, 4 a.m. youโwill thank you.
- Pattern 30 โ Strategic retreat beats stubbornness. During my final passing attempt, I walked away from a box after 40 minutes of unproductive privesc and pivoted to an easier target. That swing in points made the difference between โborderlineโ and โsafe pass.โ
On my first try, I let one stubborn box eat almost a quarter of my exam time. On my second, I treated time like a premium exam budget: if a path didnโt show promise, I moved on and came back later with cooler blood.
โThe bravest thing you can do in the exam is sometimes to stop, stand up, and change targets.โ
- Use a 30-minute timer for privesc attempts.
- Focus on one pattern at a time.
- Be willing to change targets before burnout sets in.
Apply in 60 seconds: Set a recurring 30-minute timer on your phone or watch for your next lab session and respect it.
Your 30-Day Privilege Escalation Practice Plan (With Mini Calculator)
At this point you might be thinking, โGreat, 30 patternsโฆ now where do I find the time?โ The good news: you donโt need to quit your job or disappear from your family to get solid at privesc. You just need a small, disciplined 30-day plan.
Hereโs the structure that finally worked for me after a brutal first failure:
- Days 1โ7: Pure enumeration practice (Patterns 1โ8) on easy/medium boxes.
- Days 8โ16: Linux privesc focus (Patterns 9โ18) with 1โ2 boxes per evening.
- Days 17โ24: Windows privesc focus (Patterns 19โ26) and note-refinement.
- Days 25โ30: Mixed boxes under time constraints, enforcing Patterns 27โ30.
I treated it like a small recurring bill: a daily โtime premiumโ that I paid to avoid a very expensive retake later. Hereโs a quick mini calculator to sanity-check your own plan.
Money Block #2: 30-Day Priv Esc Practice Time Calculator
Estimate your total privesc practice time for the next month.
Apply in 60 seconds: Plug in realistic numbers, then block that time on your calendar as if it were a fixed monthly bill you canโt skip.
- Anchor your plan to your exam date.
- Focus each week on a specific pattern group.
- Treat practice time like a non-negotiable bill.
Apply in 60 seconds: Use the mini calculator, then choose the exact evenings youโll dedicate to privesc in the next seven days.

Safe, Cheap OSCP Lab Setup for Privilege Escalation Practice
You donโt need a cloud fortress to practice these patterns. You do, however, need a lab thatโs safe, legal, and repeatable. Think of it like insurance for your exam prep: a small, predictable monthly cost instead of a random disaster.
Hereโs a simple tiered way to think about your privesc lab in 2025:
- Tier 1 โ Free local VMs: Vulnerable virtual machines on your laptop. Zero recurring premium, but limited realism.
- Tier 2 โ Affordable hosted platforms: Services like Proving Grounds, Hack The Box, or similar. Modest monthly โpremium,โ but with realistic scenarios.
- Tier 3 โ Cloud VPS plus self-hosted labs: Most flexible, but watch your usage so the โfinance rateโ you pay to the cloud provider doesnโt surprise you.
Money Block #3: 2025 Priv Esc Lab Cost Snapshot (Approximate)
| Resource | Typical Monthly Cost (2025) | Notes |
|---|---|---|
| Local VMs (Vuln images) | $0 (after hardware) | Great for early pattern practice. |
| Hosted practice platforms | Low double-digit $ range | Good mix of Linux/Windows privesc. |
| Cloud VPS lab | Highly variable; watch usage | Best if you want custom, long-running labs. |
Apply in 60 seconds: Pick the tier that fits your budget today, then confirm the current fee schedule on each providerโs official pricing page before entering payment details.
On my own path, I started with fully free VMs, then added a month of a hosted platform as my exam got closer. That step gave me realistic boxes with familiar misconfigurations and a clear sense of โcoverage tiersโ across Linux and Windows.
- Start free; add paid platforms later.
- Track monthly costs like any other subscription.
- Practice only on systems you own or are allowed to test.
Apply in 60 seconds: Decide which lab tier matches your budget and commit to one platform or VM set for the next 30 days.
If Youโre Studying from Asia or Another Non-US Time Zone
If youโre prepping from somewhere like Seoul, Singapore, or anywhere else far from the exam serversโ primary time zones, you have an extra constraint: time zones and sleep. Privilege escalation feels very different at 3 a.m. after a full workday.
On my own second attempt, I scheduled the exam at a time that matched my natural energy curve instead of the โcoolโ slot. That one decision made privesc patterns feel like a sequence I could follow, not a blurry puzzle I was squinting at through jet lag.
- Choose an exam slot where your usual โdeep workโ hours fall in the middle of the window.
- Do at least one full practice day in that exact schedule, including when you eat and when you take breaks.
- Pay attention to how long it takes your brain to warm up; start easier boxes first, then hit heavy privesc later.
If your local currency makes the exam feel expensive, treat your prep plan like a protective policy: the more carefully you schedule, the less likely youโll pay for an early retake. Youโre not just managing payloadsโyouโre managing your nervous system and your exam budget.
- Align the exam with your natural peak hours.
- Do a full-schedule rehearsal in advance.
- Plan breaks like you plan enumeration.
Apply in 60 seconds: Open your calendar and pencil in one โmock exam dayโ that matches your intended exam start time.
Nerdy Priv Esc Details for When You Have More Time
Once the 30 patterns feel familiar, youโll occasionally want to go deeper: sandboxing internals, token mechanics, kernel hardening, and so on. Think of this as graduate-level material you sprinkle in over months, not days.
Show me the nerdy details
When you have spare cycles, pick one pattern per week and study the underlying mechanism. For example, for SUID misconfigurations, read about how the kernel checks effective UID on execution. For token abuse, study Windows integrity levels and privilege handling. Youโre not trying to become a kernel developer; youโre trying to recognize why a pattern exists so that it sticks under stress.
Short Story: I remember a Sunday afternoon where I decided to โfinally understandโ capabilities on Linux instead of just running the same copy-pasted command. I made a coffee, opened the man pages, and walked through a few tiny experiments on a local VMโadding and removing capabilities from a test binary, watching what did and didnโt work. It wasnโt glamorous, and nobody clapped when I finished. But two weeks later, in the middle of a practice box, I saw a weird capability flag and smiled. I didnโt feel lucky; I felt prepared. That moment, quiet as it was, did more for my OSCP confidence than any flashy exploit ever did.
- Pick one pattern per week to study in depth.
- Experiment in a safe lab, not on live systems.
- Use practice platforms with good writeups to cross-check your understanding.
Apply in 60 seconds: Choose one pattern (for example, Linux capabilities) and schedule a 45-minute โtheory plus labโ session for this weekend.

FAQ
1. Do I really need to master all 30 privilege escalation patterns to pass OSCP?
No. You donโt need to be perfect; you need to be predictable. The goal of the 30 patterns is to give you structured coverage so that you donโt miss the obvious misconfig while youโre chasing something fancy. In practice, youโll lean heavily on about a dozen of them, but knowing the full list helps you recover when your favorite tricks fail.
60-second action: Circle the 10 patterns that feel most natural right now and star 3 that scare youโthose starred ones become your next practice targets.
2. How much exam time should I allocate to privilege escalation versus getting initial shells?
It depends on the point distribution, but a healthy rule of thumb is to treat privesc as part of the box, not an optional extra. If you have a strong foothold on a high-value machine, itโs often worth spending focused time on privesc before jumping to a brand-new target. The danger is letting a single box drain more than an hour of unfocused guessing.
60-second action: Decide on a hard time budget per box (for example, 30โ45 minutes for privesc after foothold) and write it on a sticky note youโll see during the exam.
3. What are the best places to practice these privilege escalation patterns legally?
Use only environments you own or have explicit permission to test. Local VMs, training platforms such as Proving Grounds or similar services, and intentionally vulnerable machines are ideal. Theyโre designed for this kind of work and give you room to make mistakes without real-world consequences.
60-second action: Write down the one platform or VM source youโll commit to for the next month and create your account or download the images today.
4. Iโm terrible at Windows privilege escalation. Can I still pass?
Yes, but youโll need a deliberate plan. Many candidates come from a Linux background and quietly avoid Windows boxes until the exam, which is the worst time to meet winPEAS output for the first time. A few weeks of focused Windows privesc practice can transform โI have no ideaโ into โI recognize this misconfig, even if I still need notes.โ
60-second action: Block three sessions in the next two weeks labeled โWindows privesc onlyโ and promise yourself you wonโt touch Linux during those blocks.
5. How do I balance privilege escalation practice with other OSCP topics like buffer overflows and web exploitation?
Think of your prep in phases. Early on, you might spend more time on web and basic enumeration. As you get closer to the exam, you shift more practice toward privilege escalation and reporting, because thatโs where many candidates lose points. Buffer overflows are important, but theyโre a single, structured challenge; privesc shows up everywhere.
60-second action: For the next four weeks, allocate a fixed percentage of your study time (for example, 40%) strictly to privesc, and adjust if you notice consistent weaknesses elsewhere.
Conclusion: From Panic to a Calm Priv Esc Routine
When I think back to that first failed OSCP attempt, what I remember most isnโt a specific boxโitโs the feeling of staring at a terminal, knowing there had to be a path to root, and having no structure to find it. The second time around, the boxes werenโt magically easier. I was just walking through a map instead of wandering in the dark.
These 30 privilege escalation patterns are that map. They wonโt remove the workโthere will still be late nights, stubborn machines, and moments where you question all your life choicesโbut they will turn panic into a series of small, knowable steps.
Hereโs your honest next step: pick one box, any box, and walk through Patterns 1โ8 slowly. Then try the Linux or Windows patterns that fit. Time yourself. Take notes like youโre writing for someone else. Thatโs it. Fifteen minutes from now, you could have your first small โwinโ logged in your notes instead of another tab of exam horror stories.
Last reviewed: 2025-12; sources included official OSCP documentation, personal lab notes, and multiple practice platformsโ machines.
Your exam is not a judgement on your worth. Itโs a timed puzzle set. The more you treat privilege escalation as a repeatable routine, the more that puzzle set feels like something you can steadily untangleโone pattern at a time.
In the next 15 minutes:
- Choose one lab platform or VM to use this week.
- Run the 30-day mini calculator once with honest numbers.
- Work through Patterns 1โ8 on a single box, slowly and intentionally.
Everything elseโpoints, reports, and that glorious โI passedโ emailโflows from that kind of quiet, methodical practice.
privilege escalation, OSCP privilege escalation patterns, OSCP exam preparation, Linux and Windows privilege escalation, OSCP lab setup