This document discusses privilege escalation techniques on Linux systems. It begins by explaining that privilege escalation involves gaining root access on a machine where you initially only have non-root access. It then outlines several common methods for escalating privileges including exploiting binaries, using valid credentials, sudo misconfigurations, cron jobs, SUID executables, and breaking out of containers. The document provides links to additional resources and recommends first reconning the system to determine which escalation methods may apply.