linux-privilege-escalation
Execute Linux Privilege Escalation Assessments
Security professionals need systematic methods to identify privilege escalation vectors on Linux systems during authorized penetration tests. This skill provides comprehensive enumeration and exploitation workflows covering kernel vulnerabilities, sudo misconfigurations, SUID binaries, and cron job weaknesses.
Die Skill-ZIP herunterladen
In Claude hochladen
Gehe zu Einstellungen â Fähigkeiten â Skills â Skill hochladen
Einschalten und loslegen
Teste es
Verwendung von "linux-privilege-escalation". User runs sudo -l and finds they can execute /usr/bin/find as root
Erwartetes Ergebnis:
GTFOBins exploitation: Run 'sudo find . -exec /bin/bash \; -quit' to spawn a root shell. The find command's -exec flag allows arbitrary command execution with root privileges.
Verwendung von "linux-privilege-escalation". SUID base64 binary discovered at /usr/bin/base64
Erwartetes Ergebnis:
Exploit: Use 'base64 /etc/shadow | base64 -d > shadow.txt' to extract password hashes. Transfer shadow.txt to attacker machine and crack with 'john --wordlist=rockyou.txt shadow.txt' to recover plaintext passwords.
Verwendung von "linux-privilege-escalation". Root cron job executes writable script at /opt/scripts/backup.sh
Erwartetes Ergebnis:
Hijack: Append 'cp /bin/bash /tmp/bash; chmod +s /tmp/bash' to the script. After cron executes, run '/tmp/bash -p' for persistent root access via SUID backdoor.
Sicherheitsaudit
KritischThis skill contains complete weaponized exploitation workflows for Linux privilege escalation. While framed as educational content for penetration testing, it provides ready-to-use commands for gaining unauthorized root access, credential theft via /etc/shadow access, SUID backdoor creation, kernel exploitation, and persistent reverse shell payloads. The static scanner correctly identified 44 high-risk patterns including sudo exploitation, SUID manipulation, and shadow file access. False positives include Ruby backtick detection (actually bash commands in markdown). This content should only be distributed in controlled professional security contexts with explicit authorization requirements.
Kritische Probleme (4)
Probleme mit hohem Risiko (6)
Probleme mit mittlerem Risiko (3)
Probleme mit niedrigem Risiko (3)
Risikofaktoren
⥠Enthält Skripte (1)
âď¸ Externe Befehle (7)
đ Netzwerkzugriff (4)
đ Dateisystemzugriff (8)
Erkannte Muster
Qualitätsbewertung
Was du bauen kannst
Authorized Penetration Testing
Security consultants performing internal network assessments use this skill to systematically identify privilege escalation paths and demonstrate business impact of initial access.
Security Audit and Compliance
System administrators audit their own infrastructure to identify and remediate misconfigurations before attackers can exploit them.
Security Training and Education
Security professionals studying for certifications like OSCP, GPEN, or CRT use this skill to understand common Linux privilege escalation techniques in lab environments.
Probiere diese Prompts
I have low-privilege shell access to a Linux system. Help me enumerate the system to identify potential privilege escalation vectors including kernel version, sudo permissions, SUID binaries, and running services.
I can run 'sudo -l' and see I have NOPASSWD access to specific binaries. Analyze the output and provide GTFOBins exploitation techniques for each allowed command.
Find all SUID binaries on this system and identify which ones can be exploited for privilege escalation. Provide specific exploitation commands for each vulnerable binary.
The kernel version is [VERSION]. Search for known exploits applicable to this kernel and provide compilation and execution instructions. Include fallback options if the primary exploit fails.
Bewährte Verfahren
- Always obtain written authorization before testing and verify scope boundaries
- Test kernel exploits in a lab environment before production use to avoid system crashes
- Document all changes made during assessment for remediation and cleanup
Vermeiden
- Running kernel exploits without understanding their mechanism or failure modes
- Creating persistent backdoors beyond the authorized assessment period
- Accessing or exfiltrating data beyond what is required to demonstrate privilege escalation
Häufig gestellte Fragen
Is this skill legal to use?
Will kernel exploits work on all Linux systems?
What should I do if an exploit crashes the system?
How do I know if a SUID binary is exploitable?
Can this skill be used in cloud environments like AWS or Azure?
What is the difference between this skill and tools like LinPEAS?
Entwicklerdetails
Autor
zebbernLizenz
MIT
Repository
https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/linux-privilege-escalationRef
main
Dateistruktur
đ SKILL.md